-
2
-
-
84883788980
-
Big data, hadoop and cloud computing in genomics
-
A. ODriscoll, J. Daugelaite, and R. D. Sleator, "Big data, hadoop and cloud computing in genomics," J. Biomed. Inform., vol. 46, no. 5, pp. 774-781, 2013.
-
(2013)
J. Biomed. Inform
, vol.46
, Issue.5
, pp. 774-781
-
-
O'Driscoll, A.1
Daugelaite, J.2
Sleator, R.D.3
-
3
-
-
84866896733
-
-
New York, NY USA: McGraw-Hill
-
P. C. Zikopoulos, C. Eaton, D. DeRoos, T. Deutsch, and G. Lapis, Understanding Big Data. New York, NY, USA: McGraw-Hill, 2012.
-
(2012)
Understanding Big Data
-
-
Zikopoulos, P.C.1
Eaton, C.2
DeRoos, D.3
Deutsch, T.4
Lapis, G.5
-
4
-
-
84904461949
-
Hvsto: Efficient privacy preserving hybrid storage in cloud data center
-
M. Dong, H. Li, K. Ota, and H. Zhu, "HVSTO: Efficient privacy preserving hybrid storage in cloud data center," in Proc. IEEE Conf. Comput. Commun. Workshops (INFOCOM WKSHPS), 2014, pp. 529-534.
-
(2014)
Proc. IEEE Conf. Comput. Commun. Workshops (INFOCOM WKSHPS
, pp. 529-534
-
-
Dong, M.1
Li, H.2
Ota, K.3
Zhu, H.4
-
5
-
-
84927584035
-
A hybrid cloud approach for secure authorized deduplication
-
May
-
J. Li, Y. K. Li, X. Chen, P. P. Lee, and W. Lou, "A hybrid cloud approach for secure authorized deduplication," IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 5, pp. 1206-1216, May 2015.
-
(2015)
IEEE Trans. Parallel Distrib. Syst
, vol.26
, Issue.5
, pp. 1206-1216
-
-
Li, J.1
Li, Y.K.2
Chen, X.3
Lee, P.P.4
Lou, W.5
-
6
-
-
70350677488
-
-
, Jun.) [Online] Available
-
M. Dutch. (2008, Jun.). SNIA: Understanding Data De-Duplication Ratios [Online]. Available: http://www.snia.org/sites/default/files/Understanding-Data-De-duplication-Ratios-20080718.pdf
-
(2008)
SNIA: Understanding Data De-Duplication Ratios
-
-
Dutch, M.1
-
7
-
-
84925082806
-
Multicloud-based evacuation services for emergency management
-
Nov
-
M. Dong, H. Li, K. Ota, L. T. Yang, and H. Zhu, "Multicloud-based evacuation services for emergency management," IEEE Cloud Comput., vol. 1, no. 4, pp. 50-59, Nov. 2014.
-
(2014)
IEEE Cloud Comput
, vol.1
, Issue.4
, pp. 50-59
-
-
Dong, M.1
Li, H.2
Ota, K.3
Yang, L.T.4
Zhu, H.5
-
8
-
-
84929164299
-
An energy-efficient and sinklocation privacy enhanced scheme for wsns through ring based routing
-
J. Long, A. Liu, M. Dong, and Z. Li, "An energy-efficient and sinklocation privacy enhanced scheme for WSNS through ring based routing," J. Parallel Distrib. Comput., vol. 81, pp. 47-65, 2015.
-
(2015)
J. Parallel Distrib. Comput
, vol.81
, pp. 47-65
-
-
Long, J.1
Liu, A.2
Dong, M.3
Li, Z.4
-
9
-
-
84961718586
-
Parq: A privacy-preserving range query scheme over encrypted metering data for smart grid
-
Jun
-
M. Wen, R. Lu, K. Zhang, J. Lei, X. Liang, and X. Shen, "PaRQ: A privacy-preserving range query scheme over encrypted metering data for smart grid," IEEE Trans. Emerging Topics Comput., vol. 1, no. 1, pp. 178-191, Jun. 2013.
-
(2013)
IEEE Trans. Emerging Topics Comput
, vol.1
, Issue.1
, pp. 178-191
-
-
Wen, M.1
Lu, R.2
Zhang, K.3
Lei, J.4
Liang, X.5
Shen, X.6
-
10
-
-
84943263073
-
Bdo-sd an efficient scheme for big data outsourcing with secure deduplication
-
M. Wen, K. Lu, J. Lei, F. Li, and J. Li, "BDO-SD an efficient scheme for big data outsourcing with secure deduplication," in Proc. IEEE 3rd Int. Workshop Security Privacy Big Data (INFOCOM WKSHPS), 2015, pp. 243-248.
-
(2015)
Proc. IEEE 3rd Int. Workshop Security Privacy Big Data (INFOCOM WKSHPS
, pp. 243-248
-
-
Wen, M.1
Lu, K.2
Lei, J.3
Li, F.4
Li, J.5
-
11
-
-
0036373715
-
Reclaiming space from duplicate files in a serverless distributed file system
-
J. R. Douceur, A. Adya, W. J. Bolosky, P. Simon, and M. Theimer, "Reclaiming space from duplicate files in a serverless distributed file system," in Proc. IEEE 22nd Int. Conf. Distrib. Comput. Syst., 2002, pp. 617-624.
-
(2002)
Proc. IEEE 22nd Int. Conf. Distrib. Comput. Syst
, pp. 617-624
-
-
Douceur, J.R.1
Adya, A.2
Bolosky, W.J.3
Simon, P.4
Theimer, M.5
-
12
-
-
85052022812
-
Dupless: Server-Aided encryption for deduplicated storage
-
M. Bellare, S. Keelveedhi, and T. Ristenpart, "Dupless: Server-Aided encryption for deduplicated storage," in Proc. 22nd USENIX Conf. Security, 2013, pp. 179-194.
-
(2013)
Proc. 22nd USENIX Conf. Security
, pp. 179-194
-
-
Bellare, M.1
Keelveedhi, S.2
Ristenpart, T.3
-
13
-
-
85055286722
-
Secure tensor decomposition using fully homomorphic encryption scheme
-
to be published
-
L. Kuang, L. T. Yang, J. Feng, and M. Dong, "Secure tensor decomposition using fully homomorphic encryption scheme," IEEE Trans. Cloud Comput., to be published.
-
IEEE Trans. Cloud Comput
-
-
Kuang, L.1
Yang, L.T.2
Feng, J.3
Dong, M.4
-
14
-
-
84937705612
-
Distributed key generation for encrypted deduplication: Achieving the strongest privacy
-
Y. Duan, "Distributed key generation for encrypted deduplication: Achieving the strongest privacy," in Proc. 6th Ed. ACM Workshop Cloud Comput. Security, 2014, pp. 57-68.
-
(2014)
Proc. 6th Ed. ACM Workshop Cloud Comput. Security
, pp. 57-68
-
-
Duan, Y.1
-
15
-
-
84943601168
-
An efficient and secure delegated multi-Authentication protocol for mobile data owners in cloud
-
L. Wei, L. Zhang, K. Zhang, and M. Dong, "An efficient and secure delegated multi-Authentication protocol for mobile data owners in cloud," in Proc. Wireless Algorithms Syst. Appl., 2015, pp. 612-622.
-
(2015)
Proc. Wireless Algorithms Syst. Appl
, pp. 612-622
-
-
Wei, L.1
Zhang, L.2
Zhang, K.3
Dong, M.4
-
16
-
-
84899741794
-
Cloudedup: Secure deduplication with encrypted data for cloud storage
-
P. Puzio, R. Molva, M. Onen, and S. Loureiro, "Cloudedup: Secure deduplication with encrypted data for cloud storage," in Proc. IEEE 5th Int. Conf. Cloud Comput. Technol. Sci. (CloudCom), 2013, vol. 1, pp. 363-370.
-
(2013)
Proc. IEEE 5th Int. Conf. Cloud Comput. Technol. Sci. (CloudCom
, vol.1
, pp. 363-370
-
-
Puzio, P.1
Molva, R.2
Onen, M.3
Loureiro, S.4
-
18
-
-
84978437474
-
Making backup cheap and easy
-
L. P. Cox, C. D. Murray, and B. D. Noble, "Making backup cheap and easy," in Proc. 5th Symp. Oper. Syst. Des. Implement., 2002, pp. 285-298.
-
(2002)
Proc. 5th Symp. Oper. Syst. Des. Implement
, pp. 285-298
-
-
Cox, L.P.1
Murray, C.D.2
Noble, B.D.3
-
19
-
-
78650053109
-
Side channels in cloud services: Deduplication in cloud storage
-
Nov.-Dec
-
B. P. D. Harnik and A. Shulman-Peleg, "Side channels in cloud services: Deduplication in cloud storage," IEEE Secur. Privacy, vol. 81, no. 6, pp. 40-47, Nov.-Dec. 2010.
-
(2010)
IEEE Secur. Privacy
, vol.81
, Issue.6
, pp. 40-47
-
-
Harnik, B.P.D.1
Shulman-Peleg, A.2
-
20
-
-
84901032811
-
Secure deduplication with efficient and reliable convergent key management
-
Jun
-
J. Li, X. Chen, M. Li, J. Li, P. P. Lee, and W. Lou, "Secure deduplication with efficient and reliable convergent key management," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 6, pp. 1615-1625, Jun. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst
, vol.25
, Issue.6
, pp. 1615-1625
-
-
Li, J.1
Chen, X.2
Li, M.3
Li, J.4
Lee, P.P.5
Lou, W.6
-
21
-
-
84961369151
-
Security of ramp schemes
-
New York, NY, USA: Springer
-
G. R. Blakley and C. Meadows, "Security of ramp schemes," in Advances in Cryptology. New York, NY, USA: Springer, 1985, pp. 242-268.
-
(1985)
Advances in Cryptology
, pp. 242-268
-
-
Blakley, G.R.1
Meadows, C.2
-
22
-
-
0032666753
-
Multiple ramp schemes
-
Jul
-
A. De Santis and B. Masucci, "Multiple ramp schemes," IEEE Trans. Inf. Theory, vol. 45, no. 5, pp. 1720-1728, Jul. 1999.
-
(1999)
IEEE Trans. Inf. Theory
, vol.45
, Issue.5
, pp. 1720-1728
-
-
De Santis, A.1
Masucci, B.2
-
23
-
-
84948954277
-
Practical threshold signatures
-
New York, NY, USA: Springer
-
V. Shoup, "Practical threshold signatures," in Advances in Cryptology EUROCRYPT 2000. New York, NY, USA: Springer, 2000, pp. 207-220.
-
(2000)
Advances in Cryptology EUROCRYPT 2000
, pp. 207-220
-
-
Shoup, V.1
-
24
-
-
80755168326
-
Proofs of ownership in remote storage systems
-
S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Proofs of ownership in remote storage systems," in Proc. 18th ACM Conf. Comput. Commun. Security, 2011, pp. 491-500.
-
(2011)
Proc. 18th ACM Conf. Comput. Commun. Security
, pp. 491-500
-
-
Halevi, S.1
Harnik, D.2
Pinkas, B.3
Shulman-Peleg, A.4
-
25
-
-
84940452998
-
Secure deduplication storage systems supporting keyword search
-
J. Li, X. Chen, F. Xhafa, and L. Barolli, "Secure deduplication storage systems supporting keyword search," J. Comput. Syst. Sci., vol. 81, no. 8, pp. 1532-1541, 2015.
-
(2015)
J. Comput. Syst. Sci
, vol.81
, Issue.8
, pp. 1532-1541
-
-
Li, J.1
Chen, X.2
Xhafa, F.3
Barolli, L.4
-
26
-
-
84928042971
-
Secure and efficient deduplication over encrypted data with dynamic updates in cloud storage
-
New York, NY, USA: Springer
-
D. Koo, J. Hur, and H. Yoon, "Secure and efficient deduplication over encrypted data with dynamic updates in cloud storage," in Frontier and Innovation in Future Computing and Communications. New York, NY, USA: Springer, 2014, pp. 229-235.
-
(2014)
Frontier and Innovation in Future Computing and Communications
, pp. 229-235
-
-
Koo, D.1
Hur, J.2
Yoon, H.3
|