-
1
-
-
84939438474
-
-
Understanding data de-duplication ratios. SNIA, February . Available from
-
Dutch M, Freeman L. Understanding data de-duplication ratios. SNIA, February 2009. Available from: http://www.snia.org/.
-
(2009)
-
-
Dutch, M.1
Freeman, L.2
-
2
-
-
78650053109
-
Side channels in cloud services, the case of deduplication in cloud storage
-
Harnik D, Pinkas B, Shulman-Peleg A. Side channels in cloud services, the case of deduplication in cloud storage. IEEE Security and Privacy Magazine, Special Issue of Cloud Security 2010; 8: 40-47.
-
(2010)
IEEE Security and Privacy Magazine, Special Issue of Cloud Security
, vol.8
, pp. 40-47
-
-
Harnik, D.1
Pinkas, B.2
Shulman-Peleg, A.3
-
3
-
-
80755168326
-
Proofs of ownership in remote storage systems
-
ACM(Association for Computing Machinery): New York, NY, USA
-
Halevi S, Harnik D, Pinkas B, Shulman-Peleg A. Proofs of ownership in remote storage systems. In ACM CCS '11: ACM Conference on Computer and Communications Security. ACM(Association for Computing Machinery): New York, NY, USA, 2011; 491-500.
-
(2011)
ACM CCS '11: ACM Conference on Computer and Communications Security
, pp. 491-500
-
-
Halevi, S.1
Harnik, D.2
Pinkas, B.3
Shulman-Peleg, A.4
-
4
-
-
84939440047
-
-
Dropbox Cloud Service. Available from
-
Dropbox Cloud Service. Available from: https://www.dropbox.com.
-
-
-
-
5
-
-
84863932631
-
Dark clouds on the horizon: using cloud storage as attack vector and online slack space
-
USENIX Association: Berkeley, CA, USA
-
Mulazzani M, Schrittwieser S, Leithner M, Huber M, Weippl E. Dark clouds on the horizon: using cloud storage as attack vector and online slack space. In USENIX Security. USENIX Association: Berkeley, CA, USA, 2011; 5-15.
-
(2011)
USENIX Security
, pp. 5-15
-
-
Mulazzani, M.1
Schrittwieser, S.2
Leithner, M.3
Huber, M.4
Weippl, E.5
-
6
-
-
74049103479
-
PoRs: proofs of retrievability for large files
-
ACM
-
Juels A, Kaliski BS, Jr. PoRs: proofs of retrievability for large files. In ACM CCS '07. ACM, 2007; 584-597.
-
(2007)
ACM CCS '07
, pp. 584-597
-
-
Juels, A.1
Kaliski, B.S.2
-
7
-
-
58349118819
-
Compact proofs of retrievability
-
Springer-Verlag
-
Shacham H, Waters B. Compact proofs of retrievability. In ASIACRYPT '08. Springer-Verlag, 2008; 90-107.
-
(2008)
ASIACRYPT '08
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
8
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Springer-Verlag
-
Wang Q, Wang C, Li J, Ren K, Lou W. Enabling public verifiability and data dynamics for storage security in cloud computing. In ESORICS'09. Springer-Verlag, 2009; 355-370.
-
(2009)
ESORICS'09
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
9
-
-
74049102823
-
Provable data possession at untrusted stores
-
ACM
-
Ateniese G, Burns R, Curtmola R, et al. Provable data possession at untrusted stores. In ACM CCS'07. ACM, 2007; 598-609.
-
(2007)
ACM CCS'07
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
-
11
-
-
0031640285
-
-
Spot-checkers, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, Dallas, TX, May 24-26
-
Ergün F, Kannan S, Ravi Kumar S, Rubinfeld R, Viswanathan M. Spot-checkers, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, Dallas, TX, May 24-26, 1998; 259-268.
-
(1998)
, pp. 259-268
-
-
Ergün, F.1
Kannan, S.2
Ravi Kumar, S.3
Rubinfeld, R.4
Viswanathan, M.5
-
12
-
-
74049144464
-
Hail: a high-availability and integrity layer for cloud storage
-
ACM
-
Bowers K, Juels A, Opera A. Hail: a high-availability and integrity layer for cloud storage. In ACM CCS '09. ACM, 2009; 187-198.
-
(2009)
ACM CCS '09
, pp. 187-198
-
-
Bowers, K.1
Juels, A.2
Opera, A.3
-
13
-
-
84939431099
-
-
Proofs of retrievability: theory and implementation. Cryptology ePrint Archive, Report 2008/175, Available from
-
Bowers K, Juels A, Oprea A. Proofs of retrievability: theory and implementation. Cryptology ePrint Archive, Report 2008/175, 2008. Available from: http://eprint.iacr.org/.
-
(2008)
-
-
Bowers, K.1
Juels, A.2
Oprea, A.3
-
14
-
-
51849117195
-
-
MR-PDP: Multiple-replica provable data possession, Proceedings of the ICDCS '08, Beijing, China
-
Curtmola R, Khan O, Burns R, Ateniese G. MR-PDP: Multiple-replica provable data possession, Proceedings of the ICDCS '08, Beijing, China, 2008; 411-420.
-
(2008)
, pp. 411-420
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
Ateniese, G.4
-
15
-
-
67650314202
-
Hardware mechanisms for memory authentication: a survey of existing techniques and engines
-
IEEE Computer Society: Washington, DC, USA
-
Elbaz R, Champagne D, Gebotys C, Lee R, Potlapally N, Torres L. Hardware mechanisms for memory authentication: a survey of existing techniques and engines. In ToCS IV, LNCS. IEEE Computer Society: Washington, DC, USA, 2009; 1-22.
-
(2009)
ToCS IV, LNCS
, pp. 1-22
-
-
Elbaz, R.1
Champagne, D.2
Gebotys, C.3
Lee, R.4
Potlapally, N.5
Torres, L.6
-
16
-
-
84969346266
-
A certified digital signature
-
Springer-Verlag, Inc.: New York, NY
-
Merkle R. A certified digital signature. In Proceedings on Advances in Cryptology, CRYPTO'89. Springer-Verlag, Inc.: New York, NY, 1989; 218-238.
-
(1989)
Proceedings on Advances in Cryptology, CRYPTO'89
, pp. 218-238
-
-
Merkle, R.1
-
17
-
-
77951086610
-
Reed-Solomon codes for low power communications
-
Biard L, Noguet D. Reed-Solomon codes for low power communications. Journal of Communications 2008; 3(2): 13-21.
-
(2008)
Journal of Communications
, vol.3
, Issue.2
, pp. 13-21
-
-
Biard, L.1
Noguet, D.2
-
18
-
-
84939434982
-
-
Crypto++ Library, 5.6.1, January . Available from
-
Dai W. Crypto++ Library, 5.6.1, January 2011. Available from: http://www.cryptopp.com/.
-
(2011)
-
-
Dai, W.1
|