-
2
-
-
85030392017
-
-
Google Drive. http://drive.google.com.
-
-
-
-
4
-
-
84883391608
-
Message-locked encryption and secure deduplication
-
M. Bellare, S. Keelveedhi, T. Ristenpart, Message-locked encryption and secure deduplication, in: Proceedings of 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT'13, 2013, pp. 296-312.
-
(2013)
Proceedings of 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT'13
, pp. 296-312
-
-
Bellare, M.1
Keelveedhi, S.2
Ristenpart, T.3
-
5
-
-
84874684634
-
-
Data Deduplication. http://en.wikipedia.org/wiki/Data-deduplication.
-
Data Deduplication
-
-
-
6
-
-
0036373715
-
Reclaiming space from duplicate files in a serverless distributed file system
-
J.R. Douceur, A. Adya, W.J. Bolosky, D. Simon, M. Theimer, Reclaiming space from duplicate files in a serverless distributed file system, in: Proceedings of the 22nd IEEE International Conference on Distributed Computing Systems, 2002, pp. 617-624.
-
(2002)
Proceedings of the 22nd IEEE International Conference on Distributed Computing Systems
, pp. 617-624
-
-
Douceur, J.R.1
Adya, A.2
Bolosky, W.J.3
Simon, D.4
Theimer, M.5
-
7
-
-
85052022812
-
DupLESS: Server-aided encryption for deduplicated storage
-
M. Bellare, S. Keelveedhi, T. Ristenpart, DupLESS: server-aided encryption for deduplicated storage, in: Proceedings of the 22nd USENIX Security Symposium, 2013, pp. 179-194.
-
(2013)
Proceedings of the 22nd USENIX Security Symposium
, pp. 179-194
-
-
Bellare, M.1
Keelveedhi, S.2
Ristenpart, T.3
-
9
-
-
84978405320
-
FARSITE: Federated, available, and reliable storage for an incompletely trusted environment
-
A. Adya, W.J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J.R. Douceur, J. Howell, J.R. Lorch, M. Theimer, R.P. Wattenhofer, FARSITE: federated, available, and reliable storage for an incompletely trusted environment, in: Proceedings of the 5th Symposium Operating Systems Design and Implementation, 2002, pp. 1-14.
-
(2002)
Proceedings of the 5th Symposium Operating Systems Design and Implementation
, pp. 1-14
-
-
Adya, A.1
Bolosky, W.J.2
Castro, M.3
Cermak, G.4
Chaiken, R.5
Douceur, J.R.6
Howell, J.7
Lorch, J.R.8
Theimer, M.9
Wattenhofer, R.P.10
-
10
-
-
85059490022
-
TAPER: Tiered approach for eliminating redundancy in replica synchronization
-
N. Jain, M. Dahlin, R. Tewari, TAPER: tiered approach for eliminating redundancy in replica synchronization, in: Proceedings of the 4th USENIX Conference on File and Storage Technologies, 2005, pp. 281-294.
-
(2005)
Proceedings of the 4th USENIX Conference on File and Storage Technologies
, pp. 281-294
-
-
Jain, N.1
Dahlin, M.2
Tewari, R.3
-
12
-
-
84874458079
-
Fast and secure laptop backups with encrypted de-duplication
-
P. Anderson, L. Zhang, Fast and secure laptop backups with encrypted de-duplication, in: Proceedings of USENIX LISA, 2010, pp. 1-8.
-
(2010)
Proceedings of USENIX LISA
, pp. 1-8
-
-
Anderson, P.1
Zhang, L.2
-
13
-
-
84901032811
-
Secure deduplication with efficient and reliable convergent key management
-
J. Li, X. Chen, M. Li, J. Li, P. Lee, W. Lou, Secure deduplication with efficient and reliable convergent key management, IEEE Trans. Parallel Distrib. Syst. 25 (6) (2014) 1615-1625.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.6
, pp. 1615-1625
-
-
Li, J.1
Chen, X.2
Li, M.3
Li, J.4
Lee, P.5
Lou, W.6
-
14
-
-
84927584035
-
A hybrid cloud approach for secure authorized deduplication
-
PrePrints
-
J. Li, Y. Li, X. Chen, P. Lee, W. Lou, A hybrid cloud approach for secure authorized deduplication, IEEE Trans. Parallel Distrib. Syst., no. 1, p. 1, PrePrints. http://dx.doi.org/10.1109/TPDS.2014.2318320.
-
IEEE Trans. Parallel Distrib. Syst.
, Issue.1
, pp. 1
-
-
Li, J.1
Li, Y.2
Chen, X.3
Lee, P.4
Lou, W.5
-
15
-
-
84897568312
-
Read-performance optimization for deduplication-based storage systems in the cloud
-
B. Mao, H. Jiang, S. Wu, Y. Fu, L. Tian, Read-performance optimization for deduplication-based storage systems in the cloud, ACM Trans. Storage 10 (2) (2014) 1-22.
-
(2014)
ACM Trans. Storage
, vol.10
, Issue.2
, pp. 1-22
-
-
Mao, B.1
Jiang, H.2
Wu, S.3
Fu, Y.4
Tian, L.5
-
16
-
-
84916638740
-
A secure data deduplication scheme for cloud storage
-
J. Stanek, A. Sorniotti, E. Androulaki, L. Kencl, A secure data deduplication scheme for cloud storage, in: Proceedings of the 18 International Conference on Financial Cryptography and Data Security, 2014.
-
(2014)
Proceedings of the 18 International Conference on Financial Cryptography and Data Security
-
-
Stanek, J.1
Sorniotti, A.2
Androulaki, E.3
Kencl, L.4
-
17
-
-
70349237760
-
Secure data deduplication
-
M. Storer, K. Greenan, D. Long, E. Miller, Secure data deduplication, in: Proceedings of the 4th ACM International Workshop on Storage Security and Survivability, 2008, pp. 1-10.
-
(2008)
Proceedings of the 4th ACM International Workshop on Storage Security and Survivability
, pp. 1-10
-
-
Storer, M.1
Greenan, K.2
Long, D.3
Miller, E.4
-
19
-
-
80755168326
-
Proofs of ownership in remote storage systems
-
S. Halevi, D. Harnik, B. Pinkas, A. Shulman-Peleg, Proofs of ownership in remote storage systems, in: Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011, pp. 491-500.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 491-500
-
-
Halevi, S.1
Harnik, D.2
Pinkas, B.3
Shulman-Peleg, A.4
-
20
-
-
84871949666
-
Boosting efficiency and security in proof of ownership for deduplication
-
R. Di Pietro, A. Sorniotti, Boosting efficiency and security in proof of ownership for deduplication, in: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, 2012, pp. 81-82.
-
(2012)
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
, pp. 81-82
-
-
Di Pietro, R.1
Sorniotti, A.2
-
21
-
-
84921497787
-
A tunable proof of ownership scheme for deduplication using bloom filters
-
J. Blasco, A. Orfila, R.D. Pietro, A. Sorniotti, A tunable proof of ownership scheme for deduplication using bloom filters, in: Proceedings of the 2nd IEEE Conference on Communications and Network Security, 2014.
-
(2014)
Proceedings of the 2nd IEEE Conference on Communications and Network Security
-
-
Blasco, J.1
Orfila, A.2
Pietro, R.D.3
Sorniotti, A.4
-
22
-
-
0018545449
-
How to share a secret
-
A. Shamir, How to share a secret, Commun. ACM 22 (1979) 612-613.
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
23
-
-
0022199386
-
Verifiable secret sharing and achieving simultaneity in the presence of faults
-
FOCS
-
B. Chor, S. Goldwasser, S. Micali, B. Awerbuch, Verifiable secret sharing and achieving simultaneity in the presence of faults, in: Proceedings of the 26th IEEE Symposaum on the Foundations of Compuler Science, FOCS, 1985, pp. 383-395.
-
(1985)
Proceedings of the 26th IEEE Symposaum on the Foundations of Compuler Science
, pp. 383-395
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
24
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
LNCS Springer-Verlag
-
T.P. Pedersen, Non-interactive and information-theoretic secure verifiable secret sharing, in: Proceedings of Advances in Cryptology, CRYPTO'91, in: LNCS, Vol. 576, Springer-Verlag, 1992, pp. 129-140.
-
(1992)
Proceedings of Advances in Cryptology, CRYPTO'91
, vol.576
, pp. 129-140
-
-
Pedersen, T.P.1
-
26
-
-
38149068986
-
Deterministic and efficiently searchable encryption
-
Springer-Verlag
-
M. Bellare, A. Boldyreva, A. O'Neill, Deterministic and efficiently searchable encryption, in: Proceedings of the 27th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO'07, Springer-Verlag, 2007, pp. 535-552.
-
(2007)
Proceedings of the 27th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO'07
, pp. 535-552
-
-
Bellare, M.1
Boldyreva, A.2
O'Neill, A.3
-
27
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, W. Lou, Fuzzy keyword search over encrypted data in cloud computing, in: Proceedings of the 29th IEEE International Conference on Computer Communications, 2010, pp. 441-445.
-
(2010)
Proceedings of the 29th IEEE International Conference on Computer Communications
, pp. 441-445
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
28
-
-
78650053109
-
Side channels in cloud services, the case of deduplication in cloud storage
-
special issue of Cloud Security
-
D. Harnik, B. Pinkas, A. Shulman-Peleg, Side channels in cloud services, the case of deduplication in cloud storage, IEEE Secur. Privacy Mag. 8 (6) (2010) 40-47. special issue of Cloud Security.
-
(2010)
IEEE Secur. Privacy Mag.
, vol.8
, Issue.6
, pp. 40-47
-
-
Harnik, D.1
Pinkas, B.2
Shulman-Peleg, A.3
-
29
-
-
26444548232
-
A new threshold blind signature scheme from pairings
-
D.L. Vo, F. Zhang, K. Kim, A new threshold blind signature scheme from pairings, in: Proceedings of the Symposium on Cryptography and Information Security, 2003, pp. 233-238.
-
(2003)
Proceedings of the Symposium on Cryptography and Information Security
, pp. 233-238
-
-
Vo, D.L.1
Zhang, F.2
Kim, K.3
|