-
1
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores," Proc. 14th ACM Conf. Computer and Comm. Security (CCS '07), pp. 598-609, 2007.
-
(2007)
Proc. 14th ACM Conf. Computer and Comm. Security (CCS '07)
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
2
-
-
70249129465
-
Scalable and efficient provable data possession
-
G. Ateniese, R. Dipietro, L.V. Mancini, and G. Tsudik, "Scalable and Efficient Provable Data Possession," Proc. Fourth Int'l Conf. Security and Privacy in Comm. Networks (SecureComm '08), 2008.
-
(2008)
Proc. Fourth Int'l Conf. Security and Privacy in Comm. Networks (SecureComm '08)
-
-
Ateniese, G.1
Dipietro, R.2
Mancini, L.V.3
Tsudik, G.4
-
3
-
-
74049121230
-
Dynamic provable data possession
-
C.C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, "Dynamic Provable Data Possession," Proc. 16th ACM Conf. Computer and Comm. Security (CCS '09), pp. 213-222, 2009.
-
(2009)
Proc. 16th ACM Conf. Computer and Comm. Security (CCS '09)
, pp. 213-222
-
-
Erway, C.C.1
Kupcu, A.2
Papamanthou, C.3
Tamassia, R.4
-
4
-
-
46649083439
-
Efficient remote data possession checking in critical information infrastructures
-
Aug.
-
F. Sebe, J. Domingo-Ferrer, A. Martinez-balleste, Y. Deswarte, and J. Quisquater, "Efficient Remote Data Possession Checking in Critical Information Infrastructures," IEEE Trans. Knowledge and Data Eng., vol. 20, no. 8, pp. 1034-1038, Aug. 2008.
-
(2008)
IEEE Trans. Knowledge and Data Eng.
, vol.20
, Issue.8
, pp. 1034-1038
-
-
Sebe, F.1
Domingo-Ferrer, J.2
Martinez-Balleste, A.3
Deswarte, Y.4
Quisquater, J.5
-
5
-
-
78650008717
-
Efficient provable data possession for hybrid clouds
-
Y. Zhu, H. Wang, Z. Hu, G.J. Ahn, H. Hu, and S.S. Yau, "Efficient Provable Data Possession for Hybrid Clouds," Proc. 17th ACM Conf. Computer and Comm. Security (CCS '10), pp. 756-758, 2010.
-
(2010)
Proc. 17th ACM Conf. Computer and Comm. Security (CCS '10)
, pp. 756-758
-
-
Zhu, Y.1
Wang, H.2
Hu, Z.3
Ahn, G.J.4
Hu, H.5
Yau, S.S.6
-
6
-
-
84890471117
-
Proxy provable data possession in public clouds
-
H. Wang, "Proxy Provable Data Possession in Public Clouds," IEEE Trans. Services Computing, DOI: 10.1109/TSC.2012.35.
-
IEEE Trans. Services Computing
-
-
Wang, H.1
-
7
-
-
84869466694
-
Cooperative provable data possession for integrity verification in multicloud storage
-
Dec.
-
Y. Zhu, H. Hu, G.J. Ahn, and M. Yu, "Cooperative Provable Data Possession for Integrity Verification in MultiCloud Storage," IEEE Trans. Parallel and Distributed Systems, vol. 23, no. 12, pp. 2231-2244, Dec. 2012.
-
(2012)
IEEE Trans. Parallel and Distributed Systems
, vol.23
, Issue.12
, pp. 2231-2244
-
-
Zhu, Y.1
Hu, H.2
Ahn, G.J.3
Yu, M.4
-
8
-
-
0023728126
-
On the power of multi-prover interactive protocols
-
L. Fortnow, J. Rompel, and M. Sipser, "On the Power of Multi-Prover Interactive Protocols," Theoretical Computer Science, pp. 156-161, 1988.
-
(1988)
Theoretical Computer Science
, pp. 156-161
-
-
Fortnow, L.1
Rompel, J.2
Sipser, M.3
-
10
-
-
0035336179
-
New explicit conditions of elliptic curve traces for FR-reduction
-
A. Miyaji, M. Nakabayashi, and S. Takano, "New Explicit Conditions of Elliptic Curve Traces for FR-Reduction," IEICE Trans. Fundamentals, vol. 5, pp. 1234-1243, 2001.
-
(2001)
IEICE Trans. Fundamentals
, vol.5
, pp. 1234-1243
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
11
-
-
23044435711
-
Short signatures from the weil pairing
-
D. Boneh, H. Shacham, and B. Lynn, "Short Signatures from the Weil Pairing," J. Cryptology, vol. 17, no. 4, pp. 297-319, 2004.
-
(2004)
J. Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Shacham, H.2
Lynn, B.3
|