-
1
-
-
84884496219
-
Message locked encryption for lock-dependent messages
-
CA, USA
-
M. Abadi, D. Boneh, I. Mironov, A. Raghunathan, G. Segev, and M. Abadi Message locked encryption for lock-dependent messages Advances in cryptology - CRYPTO CA, USA 2013 374 391
-
(2013)
Advances in cryptology - CRYPTO
, pp. 374-391
-
-
Abadi, M.1
Boneh, D.2
Mironov, I.3
Raghunathan, A.4
Segev, G.5
Abadi, M.6
-
2
-
-
82655166471
-
A five-year study of file-system metadata
-
CA, USA
-
N. Agrawal, W. Bolosky, J. Douceur, and J. Lorch A five-year study of file-system metadata Proceedings of the 5th USENIX conference on file and storage technologies CA, USA 2007 31 45
-
(2007)
Proceedings of the 5th USENIX conference on file and storage technologies
, pp. 31-45
-
-
Agrawal, N.1
Bolosky, W.2
Douceur, J.3
Lorch, J.4
-
3
-
-
84874458079
-
Fast and secure laptop backups with encrypted de-duplication
-
DC, USA
-
P. Anderson, and L. Zhang Fast and secure laptop backups with encrypted de-duplication Proc. USENIX LISA DC, USA 2010 1 8
-
(2010)
Proc. USENIX LISA
, pp. 1-8
-
-
Anderson, P.1
Zhang, L.2
-
4
-
-
84925838576
-
Why information security is hard - An economic perspective
-
New Orleans, Louisiana, USA
-
R. Anderson Why information security is hard - An economic perspective 17th Annual Computer Security Applications Conference New Orleans, Louisiana, USA 2001 358 365
-
(2001)
17th Annual Computer Security Applications Conference
, pp. 358-365
-
-
Anderson, R.1
-
5
-
-
74049102823
-
Provable data possession at untrusted stores
-
VA, USA
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, and Z. Peterson et al. Provable data possession at untrusted stores Proc. of ACM CCS VA, USA 2007 598 609
-
(2007)
Proc. of ACM CCS
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
-
7
-
-
65249147666
-
Incentivizing outsourced computation
-
DC, USA
-
M. Belenkiy, M. Chase, C.C. Erway, J. Jannotti, A. Küpçü, and A. Lysyanskaya Incentivizing outsourced computation The 3rd international workshop on Economics of networked DC, USA 2008 85 90
-
(2008)
The 3rd international workshop on Economics of networked
, pp. 85-90
-
-
Belenkiy, M.1
Chase, M.2
Erway, C.C.3
Jannotti, J.4
Küpçü, A.5
Lysyanskaya, A.6
-
9
-
-
51849127804
-
Deterministic encryption: Definitional equivalences and constructions without random oracles
-
CA, USA
-
M. Bellare, M. Fischlin, A. O'Neill, and T. Ristenpart Deterministic encryption: Definitional equivalences and constructions without random oracles Advances in cryptology - CRYPTO CA, USA 2008 360 378
-
(2008)
Advances in cryptology - CRYPTO
, pp. 360-378
-
-
Bellare, M.1
Fischlin, M.2
O'Neill, A.3
Ristenpart, T.4
-
10
-
-
85052022812
-
DupLESS: Server-aided encryption for deduplicated storage
-
DC, USA
-
M. Bellare, S. Keelveedhi, and T. Ristenpart DupLESS: Server-aided encryption for deduplicated storage USENIX security DC, USA 2013 179 194
-
(2013)
USENIX security
, pp. 179-194
-
-
Bellare, M.1
Keelveedhi, S.2
Ristenpart, T.3
-
14
-
-
51849114183
-
On notions of security for deterministic encryption, and efficient constructions without random oracles
-
CA, USA
-
A. Boldyreva, S. Fehr, and A. O'Neill On notions of security for deterministic encryption, and efficient constructions without random oracles Advances in cryptology - CRYPTO CA, USA 2008 335 359
-
(2008)
Advances in cryptology - CRYPTO
, pp. 335-359
-
-
Boldyreva, A.1
Fehr, S.2
O'Neill, A.3
-
15
-
-
84865825422
-
Security audits revisited
-
R. Böme Security audits revisited Lecture Notes in Computer Science 7397 1 2012 129 147
-
(2012)
Lecture Notes in Computer Science
, vol.7397
, Issue.1
, pp. 129-147
-
-
Böme, R.1
-
16
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Warsaw, Poland
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham Aggregate and verifiably encrypted signatures from bilinear maps Advances in cryptology - EUROCRYPT Warsaw, Poland 2003 416 432
-
(2003)
Advances in cryptology - EUROCRYPT
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
17
-
-
70350681128
-
Proofs of retrievability via hardness amplification
-
CA, USA
-
Y. Dodis, S. Vadhan, and D. Wichs Proofs of retrievability via hardness amplification Proc. of TCC CA, USA 2009 109 127
-
(2009)
Proc. of TCC
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.2
Wichs, D.3
-
18
-
-
0036373715
-
Reclaiming space from duplicate files in a serverless distributed file system
-
Vienna, Austria
-
J.R. Douceur, A. Adya, W.J. Bolosky, D.R. Simon, and M. Theimer Reclaiming space from duplicate files in a serverless distributed file system Proceedings of the 22nd international conference on distributed computing systems Vienna, Austria 2002 617 624
-
(2002)
Proceedings of the 22nd international conference on distributed computing systems
, pp. 617-624
-
-
Douceur, J.R.1
Adya, A.2
Bolosky, W.J.3
Simon, D.R.4
Theimer, M.5
-
21
-
-
74049121230
-
Dynamic provable data possession
-
IL, USA
-
C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia Dynamic provable data possession Proc. of ACM CCS IL, USA 2009 598 609
-
(2009)
Proc. of ACM CCS
, pp. 598-609
-
-
Erway, C.1
Kupcu, A.2
Papamanthou, C.3
Tamassia, R.4
-
23
-
-
84939960896
-
-
GoogleDriven
-
GoogleDriven, http://drive.google.com/.
-
-
-
-
24
-
-
27544512937
-
Deconstructing commodity storage clusters
-
WIS, USA
-
H. Gunawi, N. Agrawal, A. Arpaci-Dusseau, J. Schindler, and R. Arpaci-Dusseau Deconstructing commodity storage clusters Proc. 32nd international symposium on computer architecture WIS, USA 2005 60 71
-
(2005)
Proc. 32nd international symposium on computer architecture
, pp. 60-71
-
-
Gunawi, H.1
Agrawal, N.2
Arpaci-Dusseau, A.3
Schindler, J.4
Arpaci-Dusseau, R.5
-
25
-
-
80755168326
-
Proofs of ownership in remote storage systems
-
IL, USA
-
S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg Proofs of ownership in remote storage systems ACM conference on computer and communications security IL, USA 2011 491 500
-
(2011)
ACM conference on computer and communications security
, pp. 491-500
-
-
Halevi, S.1
Harnik, D.2
Pinkas, B.3
Shulman-Peleg, A.4
-
27
-
-
74049103479
-
PORS: Proofs of retrievability for large files
-
VA, USA
-
A. Juels, and B.S. Kaliski PORS: Proofs of retrievability for large files Proc. of ACM CCS VA, USA 2007 584 597
-
(2007)
Proc. of ACM CCS
, pp. 584-597
-
-
Juels, A.1
Kaliski, B.S.2
-
29
-
-
84901032811
-
A study of practical deduplication, secure deduplication with efficient and reliable convergent key management
-
J. Li, X. Chen, M. Li, J. Li, P.P.C. Lee, and W. Lou A study of practical deduplication, secure deduplication with efficient and reliable convergent key management IEEE Transactions on Parallel and Distributed Systems 25 6 2013 1615 1625
-
(2013)
IEEE Transactions on Parallel and Distributed Systems
, vol.25
, Issue.6
, pp. 1615-1625
-
-
Li, J.1
Chen, X.2
Li, M.3
Li, J.4
Lee, P.P.C.5
Lou, W.6
-
35
-
-
80155161434
-
A secure cloud backup system with assured deletion and version control
-
Taipei, Taiwan
-
A. Rahumed, H. Chen, Y. Tang, P. Lee, and J. Lui A secure cloud backup system with assured deletion and version control Proceedings of the 40th international conference on parallel processing workshops Taipei, Taiwan 2011 160 167
-
(2011)
Proceedings of the 40th international conference on parallel processing workshops
, pp. 160-167
-
-
Rahumed, A.1
Chen, H.2
Tang, Y.3
Lee, P.4
Lui, J.5
-
36
-
-
78650028086
-
Will outsourcing IT security lead to a higher social level of security?
-
Pittsburgh, PA, USA
-
B. Rowe Will outsourcing IT security lead to a higher social level of security? 6th Annual Workshop on the Economics of Information Security Pittsburgh, PA, USA 2007
-
(2007)
6th Annual Workshop on the Economics of Information Security
-
-
Rowe, B.1
-
38
-
-
0018545449
-
How to share a secret
-
A. Shamir How to share a secret Communications of the ACM 22 11 1979 612 613
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
39
-
-
84861654300
-
Competitive cyber-insurance and internet security
-
N. Shetty, G. Schwartz, M. Felegyhazi, and J. Walrand Competitive cyber-insurance and internet security Economics of Information Security and Privacy 1 1 2010 229 247
-
(2010)
Economics of Information Security and Privacy
, vol.1
, Issue.1
, pp. 229-247
-
-
Shetty, N.1
Schwartz, G.2
Felegyhazi, M.3
Walrand, J.4
-
40
-
-
84888986259
-
Practical dynamic proofs of retrievability
-
Berlin, Germany
-
E. Shi, E. Stefanov, and C. Papamanthou Practical dynamic proofs of retrievability Proc. of ACM CCS Berlin, Germany 2013 325 336
-
(2013)
Proc. of ACM CCS
, pp. 325-336
-
-
Shi, E.1
Stefanov, E.2
Papamanthou, C.3
-
42
-
-
33750482906
-
System reliability and free riding
-
H. Varian System reliability and free riding Economics of Information Security 12 1 2004 1 15
-
(2004)
Economics of Information Security
, vol.12
, Issue.1
, pp. 1-15
-
-
Varian, H.1
-
43
-
-
70350389843
-
Dynamic provable data possession enabling public verifiability and data dynamics for storage security in cloud computing
-
Saint Malo, France
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou Dynamic provable data possession enabling public verifiability and data dynamics for storage security in cloud computing Proc. of ESORICS'09 Saint Malo, France 2009 355 370
-
(2009)
Proc. of ESORICS'09
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
46
-
-
84893549172
-
Secure and constant cost public cloud storage auditing with deduplication
-
DC, USA
-
J. Yuan, and S. Yu Secure and constant cost public cloud storage auditing with deduplication IEEE conference on communications and network security DC, USA 2013 145 153
-
(2013)
IEEE conference on communications and network security
, pp. 145-153
-
-
Yuan, J.1
Yu, S.2
-
47
-
-
84870958312
-
Managing interdependent information security risks: A study of cyberinsurance, managed security service and risk pooling
-
Arizona, USA
-
X. Zhao, L. Xue, and A. Whinston, Managing interdependent information security risks: A study of cyberinsurance, managed security service and risk pooling Proceedings of ICIS Arizona, USA 2009 15 18
-
(2009)
Proceedings of ICIS
, pp. 15-18
-
-
Zhao, X.1
Xue, L.2
Whinston, A.3
|