-
1
-
-
84937694188
-
-
Bitcasa. http://www.bitcasa.com/.
-
Bitcasa
-
-
-
2
-
-
84937686847
-
-
Ciphertite. http://www.ciphertite.com.
-
Ciphertite
-
-
-
3
-
-
84937718733
-
-
Dropbox. http://www.dropbox.com/.
-
Dropbox
-
-
-
4
-
-
84937711660
-
-
flud. http://flud.org.
-
Flud
-
-
-
5
-
-
84937704360
-
-
Freenet. https://freenetproject.org/.
-
Freenet
-
-
-
6
-
-
84937680688
-
-
GNUnet. http://gnunet.org.
-
GNUnet
-
-
-
7
-
-
85094658894
-
Fast and secure laptop backups with encrypted de-duplication
-
Berkeley, CA, USA, USENIX Association
-
P. Anderson and L. Zhang. Fast and secure laptop backups with encrypted de-duplication. In Proceedings of the 24th international conference on Large installation system administration, LISA'10, pages 1-8, Berkeley, CA, USA, 2010. USENIX Association.
-
(2010)
Proceedings of the 24th International Conference on Large Installation System Administration, LISA'10
, pp. 1-8
-
-
Anderson, P.1
Zhang, L.2
-
8
-
-
35448955720
-
Privacy, accuracy, and consistency too: A holistic solution to contingency table release
-
New York, NY, USA, ACM Press
-
B. Barak, K. Chaudhuri, C. Dwork, S. Kale, F. McSherry, and K. Talwar. Privacy, accuracy, and consistency too: A holistic solution to contingency table release. In PODS '07, pages 273-282, New York, NY, USA, 2007. ACM Press.
-
(2007)
PODS '07
, pp. 273-282
-
-
Barak, B.1
Chaudhuri, K.2
Dwork, C.3
Kale, S.4
McSherry, F.5
Talwar, K.6
-
9
-
-
38149068986
-
Deterministic and efficiently searchable encryption
-
Berlin, Heidelberg, Springer-Verlag. Full Version of this paper at
-
M. Bellare, A. Boldyreva, and A. O'Neill. Deterministic and efficiently searchable encryption. In Proceedings of the 27th annual international cryptology conference on Advances in cryptology, CRYPTO'07, pages 535-552, Berlin, Heidelberg, 2007. Springer-Verlag. Full Version of this paper at http://www.cc.gatech.edu/aboldyre/papers/bbo.pdf.
-
(2007)
Proceedings of the 27th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO'07
, pp. 535-552
-
-
Bellare, M.1
Boldyreva, A.2
O'Neill, A.3
-
10
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
Washington, DC, USA, IEEE Computer Society
-
M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A concrete security treatment of symmetric encryption. In Proceedings of the 38th Annual Symposium on Foundations of Computer Science, FOCS '97, pages 394-403, Washington, DC, USA, 1997. IEEE Computer Society.
-
(1997)
Proceedings of the 38th Annual Symposium on Foundations of Computer Science, FOCS '97
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
11
-
-
51849127804
-
Deterministic encryption: Definitional equivalences and constructions without random oracles
-
Berlin, Heidelberg, Springer-Verlag
-
M. Bellare, M. Fischlin, A. O'Neill, and T. Ristenpart. Deterministic encryption: Definitional equivalences and constructions without random oracles. In Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology, CRYPTO 2008, pages 360-378, Berlin, Heidelberg, 2008. Springer-Verlag.
-
(2008)
Proceedings of the 28th Annual Conference on Cryptology: Advances in Cryptology, CRYPTO 2008
, pp. 360-378
-
-
Bellare, M.1
Fischlin, M.2
O'Neill, A.3
Ristenpart, T.4
-
13
-
-
84883391608
-
Message-locked encryption and secure deduplication
-
T. Johansson and P. Nguyen, editors, volume 7881 of Lecture Notes in Computer Science, Springer Berlin Heidelberg
-
M. Bellare, S. Keelveedhi, and T. Ristenpart. Message-locked encryption and secure deduplication. In T. Johansson and P. Nguyen, editors, Advances in Cryptology lC EUROCRYPT 2013, volume 7881 of Lecture Notes in Computer Science, pages 296-312. Springer Berlin Heidelberg, 2013.
-
(2013)
Advances in Cryptology LC EUROCRYPT 2013
, pp. 296-312
-
-
Bellare, M.1
Keelveedhi, S.2
Ristenpart, T.3
-
14
-
-
84947444524
-
Efficient sharing of encrypted data
-
London, UK, UK, Springer-Verlag
-
K. Bennett, C. Grothoff, T. Horozov, and I. Patrascu. Efficient sharing of encrypted data. In Proceedings of the 7th Australian Conference on Information Security and Privacy, ACISP '02, pages 107-120, London, UK, UK, 2002. Springer-Verlag.
-
(2002)
Proceedings of the 7th Australian Conference on Information Security and Privacy, ACISP '02
, pp. 107-120
-
-
Bennett, K.1
Grothoff, C.2
Horozov, T.3
Patrascu, I.4
-
15
-
-
33244468835
-
Practical privacy: The sulq framework
-
New York, NY, USA, ACM Press
-
A. Blum, C. Dwork, F. McSherry, and K. Nissim. Practical privacy: The SuLQ framework. In PODS '05, pages 128-138, New York, NY, USA, 2005. ACM Press.
-
(2005)
PODS '05
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
16
-
-
51849114183
-
On notions of security for deterministic encryption, and efficient constructions without random oracles
-
Berlin, Heidelberg, Springer-Verlag
-
A. Boldyreva, S. Fehr, and A. O'Neill. On notions of security for deterministic encryption, and efficient constructions without random oracles. In Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology, CRYPTO 2008, pages 335-359, Berlin, Heidelberg, 2008. Springer-Verlag.
-
(2008)
Proceedings of the 28th Annual Conference on Cryptology: Advances in Cryptology, CRYPTO 2008
, pp. 335-359
-
-
Boldyreva, A.1
Fehr, S.2
O'Neill, A.3
-
17
-
-
0034444963
-
Feasibility of a serverless distributed file system deployed on an existing set of desktop pcs
-
New York, NY, USA, ACM
-
W. J. Bolosky, J. R. Douceur, D. Ely, and M. Theimer. Feasibility of a serverless distributed file system deployed on an existing set of desktop pcs. In Proceedings of the 2000 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, SIGMETRICS '00, pages 34-43, New York, NY, USA, 2000. ACM.
-
(2000)
Proceedings of the 2000 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS '00
, pp. 34-43
-
-
Bolosky, W.J.1
Douceur, J.R.2
Ely, D.3
Theimer, M.4
-
18
-
-
4243114091
-
Efficient generation of shared rsa keys
-
July
-
D. Boneh and M. Franklin. Efficient generation of shared rsa keys. J. ACM, 48(4):702-722, July 2001.
-
(2001)
J. ACM
, vol.48
, Issue.4
, pp. 702-722
-
-
Boneh, D.1
Franklin, M.2
-
19
-
-
0020915882
-
Blind signatures for untraceable payments
-
D. Chaum, R. Rivest, and A. Sherman, editors, Springer US
-
D. Chaum. Blind signatures for untraceable payments. In D. Chaum, R. Rivest, and A. Sherman, editors, Advances in Cryptology, pages 199-203. Springer US, 1983.
-
(1983)
Advances in Cryptology
, pp. 199-203
-
-
Chaum, D.1
-
20
-
-
33244497078
-
Auditing for secure statistical databases
-
New York, NY, USA, ACM
-
F. Chin and G. Ozsoyoglu. Auditing for secure statistical databases. In ACM 81: Proceedings of the ACM '81 conference, pages 53-59, New York, NY, USA, 1981. ACM.
-
(1981)
ACM 81: Proceedings of the ACM '81 Conference
, pp. 53-59
-
-
Chin, F.1
Ozsoyoglu, G.2
-
21
-
-
85077030674
-
Decentralized deduplication in san cluster file systems
-
Berkeley, CA, USA, USENIX Association
-
A. T. Clements, I. Ahmad, M. Vilayannur, and J. Li. Decentralized deduplication in san cluster file systems. In Proceedings of the 2009 conference on USENIX Annual technical conference, USENIX'09, pages 8-8, Berkeley, CA, USA, 2009. USENIX Association.
-
(2009)
Proceedings of the 2009 Conference on USENIX Annual Technical Conference, USENIX'09
, pp. 8-8
-
-
Clements, A.T.1
Ahmad, I.2
Vilayannur, M.3
Li, J.4
-
22
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
H. Krawczyk, editor, volume 1462 of Lecture Notes in Computer Science, Springer Berlin Heidelberg
-
R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In H. Krawczyk, editor, Advances in Cryptology CRYPTO '98, volume 1462 of Lecture Notes in Computer Science, pages 13-25. Springer Berlin Heidelberg, 1998.
-
(1998)
Advances in Cryptology CRYPTO '98
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
23
-
-
0012793677
-
Towards a methodology for statistical disclosure control
-
T. Dalenius. Towards a methodology for statistical disclosure control. Statistik Tidskrift, 15:429-444, 1977.
-
(1977)
Statistik Tidskrift
, vol.15
, pp. 429-444
-
-
Dalenius, T.1
-
24
-
-
84945127249
-
Practical threshold rsa signatures without a trusted dealer
-
London, UK, UK, Springer-Verlag
-
I. Damgard and M. Koprowski. Practical threshold rsa signatures without a trusted dealer. In Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology, EUROCRYPT '01, pages 152-165, London, UK, UK, 2001. Springer-Verlag.
-
(2001)
Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology, EUROCRYPT '01
, pp. 152-165
-
-
Damgard, I.1
Koprowski, M.2
-
25
-
-
77949590096
-
Efficient, robust and constant-round distributed rsa key generation
-
Berlin, Heidelberg, Springer-Verlag
-
I. Damgard and G. L. Mikkelsen. Efficient, robust and constant-round distributed rsa key generation. In Proceedings of the 7th international conference on Theory of Cryptography, TCC'10, pages 183-200, Berlin, Heidelberg, 2010. Springer-Verlag.
-
(2010)
Proceedings of the 7th International Conference on Theory of Cryptography, TCC'10
, pp. 183-200
-
-
Damgard, I.1
Mikkelsen, G.L.2
-
26
-
-
1142275486
-
Revealing information while preserving privacy
-
New York, NY, USA, ACM Press
-
I. Dinur and K. Nissim. Revealing information while preserving privacy. In PODS '03, pages 202-210, New York, NY, USA, 2003. ACM Press.
-
(2003)
PODS '03
, pp. 202-210
-
-
Dinur, I.1
Nissim, K.2
-
27
-
-
0036373715
-
Reclaiming space from duplicate files in a serverless distributed file system
-
Washington, DC, USA, IEEE Computer Society
-
J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer. Reclaiming space from duplicate files in a serverless distributed file system. In Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02), ICDCS '02, pages 617-624, Washington, DC, USA, 2002. IEEE Computer Society.
-
(2002)
Proceedings of the 22 Nd International Conference on Distributed Computing Systems (ICDCS'02), ICDCS '02
, pp. 617-624
-
-
Douceur, J.R.1
Adya, A.2
Bolosky, W.J.3
Simon, D.4
Theimer, M.5
-
28
-
-
74549191363
-
Privacy without noise
-
New York, NY, USA, ACM
-
Y. Duan. Privacy without noise. In CIKM '09, New York, NY, USA, 2009. ACM.
-
(2009)
CIKM '09
-
-
Duan, Y.1
-
29
-
-
33746616826
-
Protecting user data in ubiquitous computing: Towards trustworthy environments
-
Y. Duan and J. Canny. Protecting user data in ubiquitous computing: Towards trustworthy environments. In PET'04, 2004.
-
(2004)
PET'04
-
-
Duan, Y.1
Canny, J.2
-
30
-
-
33745671881
-
How to construct multicast cryptosystems provably secure against adaptive chosen ciphertext attack
-
San Jose, USA, volume 3860 of Lecture Notes in Computer Science, Springer-Verlag
-
Y. Duan and J. Canny. How to construct multicast cryptosystems provably secure against adaptive chosen ciphertext attack. In RSA Conference 2006, Cryptographers' Track. San Jose, USA, volume 3860 of Lecture Notes in Computer Science, pages 244-261. Springer-Verlag, 2006.
-
(2006)
RSA Conference 2006, Cryptographers' Track
, pp. 244-261
-
-
Duan, Y.1
Canny, J.2
-
31
-
-
84883298285
-
P4P: Practical large-scale privacy-preserving distributed computation robust against malicious users
-
Y. Duan, J. Canny, and J. Zhan. P4P: Practical large-scale privacy-preserving distributed computation robust against malicious users. In USENIX Security Symposium 2010, pages 609-618, 2010.
-
(2010)
USENIX Security Symposium 2010
, pp. 609-618
-
-
Duan, Y.1
Canny, J.2
Zhan, J.3
-
33
-
-
41849095625
-
An ad omnia approach to defining and achieving private data analysis
-
C. Dwork. An ad omnia approach to defining and achieving private data analysis. In PinKDD, pages 1-13, 2007.
-
(2007)
PinKDD
, pp. 1-13
-
-
Dwork, C.1
-
34
-
-
57049085430
-
Our data, ourselves: Privacy via distributed noise generation
-
Springer
-
C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor. Our data, ourselves: Privacy via distributed noise generation. In EUROCRYPT 2006. Springer, 2006.
-
(2006)
EUROCRYPT 2006
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
-
35
-
-
33746086554
-
Calibrating noise to sensitivity in private data analysis
-
Springer
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC 2006. Springer, 2006.
-
(2006)
TCC 2006
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
36
-
-
84937710265
-
-
EMC. http://www.emc.com/solutions/samples/backuprecovery-archiving/backup-data-deduplication.htm.
-
EMC
-
-
-
37
-
-
84946830669
-
Fully distributed threshold RSA under standard assumptions
-
London, UK, UK, Springer-Verlag
-
P.-A. Fouque and J. Stern. Fully distributed threshold RSA under standard assumptions. In Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, ASIACRYPT '01, pages 310-330, London, UK, UK, 2001. Springer-Verlag.
-
(2001)
Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, ASIACRYPT '01
, pp. 310-330
-
-
Fouque, P.-A.1
Stern, J.2
-
38
-
-
0031628726
-
Robust efficient distributed rsa-key generation
-
New York, NY, USA, ACM
-
Y. Frankel, P. D. MacKenzie, and M. Yung. Robust efficient distributed rsa-key generation. In Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing, PODC '98, pages 320-, New York, NY, USA, 1998. ACM.
-
(1998)
Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, PODC '98
, pp. 320
-
-
Frankel, Y.1
MacKenzie, P.D.2
Yung, M.3
-
39
-
-
85050160774
-
Probabilistic encryption & how to play mental poker keeping secret all partial information
-
New York, NY, USA, ACM
-
S. Goldwasser and S. Micali. Probabilistic encryption & how to play mental poker keeping secret all partial information. In Proceedings of the fourteenth annual ACM symposium on Theory of computing, STOC '82, pages 365-377, New York, NY, USA, 1982. ACM.
-
(1982)
Proceedings of the Fourteenth Annual ACM Symposium on Theory of Computing, STOC '82
, pp. 365-377
-
-
Goldwasser, S.1
Micali, S.2
-
41
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
Feb
-
S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM J. Comput., 18(1):186-208, Feb. 1989.
-
(1989)
SIAM J. Comput
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
42
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali, and R. L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2):281-308, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
43
-
-
84957620003
-
Threshold dss signatures without a trusted party
-
London, UK, UK, Springer-Verlag
-
S. K. Langford. Threshold dss signatures without a trusted party. In Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO '95, pages 397-409, London, UK, UK, 1995. Springer-Verlag.
-
(1995)
Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO '95
, pp. 397-409
-
-
Langford, S.K.1
-
44
-
-
70350678967
-
Differentially private recommender systems: Building privacy into the netflix prize contenders
-
New York, NY, USA, ACM
-
F. McSherry and I. Mironov. Differentially private recommender systems: Building privacy into the netflix prize contenders. In KDD '09, pages 627-636, New York, NY, USA, 2009. ACM.
-
(2009)
KDD '09
, pp. 627-636
-
-
McSherry, F.1
Mironov, I.2
-
45
-
-
85084162873
-
Strong security for network-attached storage
-
Berkeley, CA, USA, USENIX Association
-
E. L. Miller, D. D. E. Long, W. E. Freeman, and B. Reed. Strong security for network-attached storage. In Proceedings of the Conference on File and Storage Technologies, FAST '02, pages 1-13, Berkeley, CA, USA, 2002. USENIX Association.
-
(2002)
Proceedings of the Conference on File and Storage Technologies, FAST '02
, pp. 1-13
-
-
Miller, E.L.1
Long, D.D.E.2
Freeman, W.E.3
Reed, B.4
-
46
-
-
35448955271
-
Smooth sensitivity and sampling in private data analysis
-
ACM
-
K. Nissim, S. Raskhodnikova, and A. Smith. Smooth sensitivity and sampling in private data analysis. In STOC '07, pages 75-84. ACM, 2007.
-
(2007)
STOC '07
, pp. 75-84
-
-
Nissim, K.1
Raskhodnikova, S.2
Smith, A.3
-
47
-
-
84937686129
-
Deterministic symmetric encryption (semantic security and pseudo-random permutations)
-
volume 3357 of Lecture Notes in Computer Science, Waterloo, Canada, Springer
-
D. H. Phan and D. Pointcheval. Deterministic Symmetric Encryption (Semantic Security and Pseudo-Random Permutations). In Proceedings of the 11th Annual Workshop on Selected Areas in Cryptography (SAC '04), volume 3357 of Lecture Notes in Computer Science, pages 185-200, Waterloo, Canada, 2004. Springer.
-
(2004)
Proceedings of the 11th Annual Workshop on Selected Areas in Cryptography (SAC '04)
, pp. 185-200
-
-
Phan, D.H.1
Pointcheval, D.2
-
48
-
-
26444532494
-
Ocb: A block-cipher mode of operation for efficient authenticated encryption
-
Aug
-
P. Rogaway, M. Bellare, and J. Black. Ocb: A block-cipher mode of operation for efficient authenticated encryption. ACM Trans. Inf. Syst. Secur., 6(3):365-403, Aug. 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.3
, pp. 365-403
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
-
49
-
-
84948954277
-
Practical threshold signatures
-
Berlin, Heidelberg, Springer-Verlag
-
V. Shoup. Practical threshold signatures. In Proceedings of the 19th international conference on Theory and application of cryptographic techniques, EUROCRYPT'00, pages 207-220, Berlin, Heidelberg, 2000. Springer-Verlag.
-
(2000)
Proceedings of the 19th International Conference on Theory and Application of Cryptographic Techniques, EUROCRYPT'00
, pp. 207-220
-
-
Shoup, V.1
-
51
-
-
67650346359
-
Tahoe: The least-authority filesystem
-
New York, NY, USA, ACM
-
Z. Wilcox-O'Hearn and B. Warner. Tahoe: The least-authority filesystem. In Proceedings of the 4th ACM international workshop on Storage security and survivability, StorageSS '08, pages 21-26, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 4th ACM International Workshop on Storage Security and Survivability, StorageSS '08
, pp. 21-26
-
-
Wilcox-O'Hearn, Z.1
Warner, B.2
-
52
-
-
78349261217
-
Peerdedupe: Insights into the peer-assisted sampling deduplication
-
IEEE
-
Y. Xing, Z. Li, and Y. Dai. Peerdedupe: Insights into the peer-assisted sampling deduplication. In Peer-to-Peer Computing, pages 1-10. IEEE, 2010.
-
(2010)
Peer-to-Peer Computing
, pp. 1-10
-
-
Xing, Y.1
Li, Z.2
Dai, Y.3
-
53
-
-
84904426391
-
A scalable deduplication file system for virtual machine images
-
PrePrints
-
X. Zhao, Y. Zhang, Y. Wu, K. Chen, J. Jiang, and K. Li. Liquid: A scalable deduplication file system for virtual machine images. IEEE Transactions on Parallel and Distributed Systems, 99(PrePrints):1, 2013.
-
(2013)
IEEE Transactions on Parallel and Distributed Systems
, vol.99
, pp. 1
-
-
Zhao, X.1
Zhang, Y.2
Wu, Y.3
Chen, K.4
Jiang, J.5
Liquid, K.Li.6
|