-
1
-
-
77956778645
-
Secure outsourcing of scientific computations
-
M. J. Atallah, K. N. Pantazopoulos, J. R. Rice, E. E. Spafford,"Secure outsourcing of scientific computations," Adv. Comput., vol. 54,pp. 215-272, 2002.
-
(2002)
Adv. Comput.
, vol.54
, pp. 215-272
-
-
Atallah, M.J.1
Pantazopoulos, K.N.2
Rice, J.R.3
Spafford, E.E.4
-
3
-
-
79960862322
-
Secure and practical outsourcing oflinear programming in cloud computing
-
Apr.
-
C. Wang, K. Ren, J. Wang, "Secure and practical outsourcing oflinear programming in cloud computing," in Proc. IEEE INFOCOM,Apr. 2011, pp. 820-828.
-
(2011)
Proc IEEE INFOCOM
, pp. 820-828
-
-
Wang, C.1
Ren, K.2
Wang, J.3
-
4
-
-
84865597567
-
New algorithms for secureoutsourcing of modular exponentiations
-
X. Chen, J. Li, J. Ma, Q. Tang, W. Lou, "New algorithms for secureoutsourcing of modular exponentiations," in Proc. 17th Eur. Symp. Res.Comput. Secur., 2012, pp. 541-556.
-
(2012)
Proc. 17th Eur. Symp. Res.Comput. Secur.
, pp. 541-556
-
-
Chen, X.1
Li, J.2
Ma, J.3
Tang, Q.4
Lou, W.5
-
7
-
-
58349118819
-
Compact proofs of retrievability
-
Berlin, Germany: Springer-Verlag
-
H. Shacham and B. Waters, "Compact proofs of retrievability," inAdvances in Cryptology. Berlin, Germany: Springer-Verlag, 2008,pp. 90-107.
-
(2008)
Advances in Cryptology
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
8
-
-
70249129465
-
Scalable andefficient provable data possession
-
G. Ateniese, R. Di Pietro, L. V. Mancini, G. Tsudik, "Scalable andefficient provable data possession," in Proc. 4th Int. Conf. Secur. PrivacyCommun. Netw., 2008, Art. ID 9.
-
(2008)
Proc. 4th Int. Conf. Secur. PrivacyCommun. Netw.
-
-
Ateniese, G.1
Di Pietro, R.2
Mancini, L.V.3
Tsudik, G.4
-
9
-
-
46649083439
-
Efficient remote data possession checking in criticalinformation infrastructures
-
Aug.
-
F. Sebe, J. Domingo-Ferrer, A. Martinez-balleste, Y. Deswarte, J. Quisquater, "Efficient remote data possession checking in criticalinformation infrastructures," IEEE Trans. Knowl. Data Eng., vol. 20,no. 8, pp. 1034-1038, Aug. 2008.
-
(2008)
IEEE Trans. Knowl. Data Eng.
, vol.20
, Issue.8
, pp. 1034-1038
-
-
Sebe, F.1
Domingo-Ferrer, J.2
Martinez-Balleste, A.3
Deswarte, Y.4
Quisquater, J.5
-
10
-
-
51849117195
-
MR-PDP: Multiplereplicaprovable data possession
-
Jun.
-
R. Curtmola, O. Khan, R. Burns, G. Ateniese, "MR-PDP: Multiplereplicaprovable data possession," in Proc. 28th IEEE Int. Conf. Distrib.Comput. Syst., Jun. 2008, pp. 411-420.
-
(2008)
Proc. 28th IEEE Int. Conf. Distrib.Comput. Syst.
, pp. 411-420
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
Ateniese, G.4
-
11
-
-
78650008717
-
Efficientprovable data possession for hybrid clouds
-
Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, S. S. Yau, "Efficientprovable data possession for hybrid clouds," in Proc. 17th ACM Conf.Comput. Commun. Secur., 2010, pp. 756-758.
-
(2010)
Proc. 17th ACM Conf.Comput. Commun. Secur.
, pp. 756-758
-
-
Zhu, Y.1
Wang, H.2
Hu, Z.3
Ahn, G.-J.4
Hu, H.5
Yau, S.S.6
-
12
-
-
77954843911
-
Toward publicly auditable securecloud data storage services
-
Jul./Aug.
-
C. Wang, K. Ren, W. Lou, J. Li, "Toward publicly auditable securecloud data storage services," IEEE Netw., vol. 24, no. 4, pp. 19-24,Jul./Aug. 2010.
-
(2010)
IEEE Netw.
, vol.24
, Issue.4
, pp. 19-24
-
-
Wang, C.1
Ren, K.2
Lou, W.3
Li, J.4
-
13
-
-
79953294892
-
Enabling publicauditability and data dynamics for storage security in cloud computing
-
May
-
Q. Wang, C. Wang, K. Ren, W. Lou, J. Li, "Enabling publicauditability and data dynamics for storage security in cloud computing,"IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 5, pp. 847-859,May 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
14
-
-
84858284080
-
Data storage auditing service in cloud computing:Challenges, methods and opportunities
-
K. Yang and X. Jia, "Data storage auditing service in cloud computing:Challenges, methods and opportunities," World Wide Web, vol. 15, no. 4,pp. 409-428, 2012.
-
(2012)
World Wide Web
, vol.15
, Issue.4
, pp. 409-428
-
-
Yang, K.1
Jia, X.2
-
15
-
-
84878830854
-
Dynamicaudit services for outsourced storages in clouds
-
Apr./Jun.
-
Y. Zhu, G.-J. Ahn, H. Hu, S. S. Yau, H. G. An, C.-J. Hu, "Dynamicaudit services for outsourced storages in clouds," IEEE Trans. ServicesComput., vol. 6, no. 2, pp. 227-238, Apr./Jun. 2013.
-
(2013)
IEEE Trans. ServicesComput.
, vol.6
, Issue.2
, pp. 227-238
-
-
Zhu, Y.1
Ahn, G.-J.2
Hu, H.3
Yau, S.S.4
An, H.G.5
Hu, C.-J.6
-
16
-
-
84881080693
-
An efficient and secure dynamic auditing protocolfor data storage in cloud computing
-
Sep.
-
K. Yang and X. Jia, "An efficient and secure dynamic auditing protocolfor data storage in cloud computing," IEEE Trans. Parallel Distrib. Syst.,vol. 24, no. 9, pp. 1717-1726, Sep. 2013.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.9
, pp. 1717-1726
-
-
Yang, K.1
Jia, X.2
-
17
-
-
84890471117
-
Proxy provable data possession in public clouds
-
Oct./Dec.
-
H. Wang, "Proxy provable data possession in public clouds," IEEETrans. Services Comput., vol. 6, no. 4, pp. 551-559, Oct./Dec. 2013.
-
(2013)
IEEE Trans. Services Comput.
, vol.6
, Issue.4
, pp. 551-559
-
-
Wang, H.1
-
18
-
-
84861959172
-
Privacypreservingpublic auditing for secure cloud storage
-
Feb.
-
C. Wang, S. S. M. Chow, Q. Wang, K. Ren, W. Lou, "Privacypreservingpublic auditing for secure cloud storage," IEEE Trans.Comput., vol. 62, no. 2, pp. 362-375, Feb. 2013.
-
(2013)
IEEE Trans.Comput.
, vol.62
, Issue.2
, pp. 362-375
-
-
Wang, C.1
Chow, S.S.M.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
19
-
-
84922271700
-
Oruta: Privacy-preserving publicauditing for shared data in the cloud
-
Jan./Mar.
-
B. Wang, B. Li, H. Li Oruta, "Oruta: Privacy-preserving publicauditing for shared data in the cloud," IEEE Trans. Cloud Comput.,vol. 2, no. 1, pp. 43-56, Jan./Mar. 2014.
-
(2014)
IEEE Trans. Cloud Comput.
, vol.2
, Issue.1
, pp. 43-56
-
-
Wang, B.1
Li, B.2
Li Oruta, H.3
-
20
-
-
74049121230
-
Dynamicprovable data possession
-
C. Erway, A. Küpçü, C. Papamanthou, R. Tamassia, "Dynamicprovable data possession," in Proc. 16th ACM Conf. Comput. Commun.Secur., 2009, pp. 213-222.
-
(2009)
Proc. 16th ACM Conf. Comput. Commun.Secur.
, pp. 213-222
-
-
Erway, C.1
Küpçü, A.2
Papamanthou, C.3
Tamassia, R.4
-
21
-
-
84883057189
-
Public auditing for shared data with efficientuser revocation in the cloud
-
Apr.
-
B. Wang, B. Li, H. Li, "Public auditing for shared data with efficientuser revocation in the cloud," in Proc. IEEE INFOCOM, Apr. 2013,pp. 2904-2912.
-
(2013)
Proc IEEE INFOCOM
, pp. 2904-2912
-
-
Wang, B.1
Li, B.2
Li, H.3
-
22
-
-
84934283890
-
Public integrity auditing for dynamic data sharingwith multiuser modification
-
Aug.
-
J. Yuan and S. Yu, "Public integrity auditing for dynamic data sharingwith multiuser modification," IEEE Trans. Inf. Forensics Security,vol. 10, no. 8, pp. 1717-1726, Aug. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.8
, pp. 1717-1726
-
-
Yuan, J.1
Yu, S.2
-
23
-
-
84928139575
-
Enabling cloud storageauditing with key-exposure resistance
-
Jun.
-
J. Yu, K. Ren, C. Wang, V. Varadharajan, "Enabling cloud storageauditing with key-exposure resistance," IEEE Trans. Inf. ForensicsSecurity, vol. 10, no. 6, pp. 1167-1179, Jun. 2015.
-
(2015)
IEEE Trans. Inf. ForensicsSecurity
, vol.10
, Issue.6
, pp. 1167-1179
-
-
Yu, J.1
Ren, K.2
Wang, C.3
Varadharajan, V.4
-
24
-
-
85001025766
-
Wallet databases with observers
-
Berlin, Germany: Springer-Verlag
-
D. Chaum and T. Pedersen, "Wallet databases with observers," inAdvances in Cryptology. Berlin, Germany: Springer-Verlag, 1993,pp. 89-105.
-
(1993)
Advances in Cryptology
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.2
-
25
-
-
78650755198
-
Secure delegation of elliptic-curve pairing
-
B. Chevallier-Mames, J.-S. Coron, N. McCullagh, D. Naccache, M. Scott, "Secure delegation of elliptic-curve pairing," in Proc. CARDIS,2010, pp. 24-35.
-
(2010)
Proc. CARDIS
, pp. 24-35
-
-
Chevallier-Mames, B.1
Coron, J.-S.2
McCullagh, N.3
Naccache, D.4
Scott, M.5
-
26
-
-
24144493423
-
How to securely outsourcecryptographic computations
-
S. Hohenberger and A. Lysyanskaya, "How to securely outsourcecryptographic computations," in Proc. TCC, 2005, pp. 264-282.
-
(2005)
Proc. TCC
, pp. 264-282
-
-
Hohenberger, S.1
Lysyanskaya, A.2
-
27
-
-
27644520949
-
Secure outsourcing of sequencecomparisons
-
M. J. Atallah and J. Li, "Secure outsourcing of sequencecomparisons," Int. J. Inf. Secur., vol. 4, no. 4, pp. 277-287, 2005.
-
(2005)
Int. J. Inf. Secur.
, vol.4
, Issue.4
, pp. 277-287
-
-
Atallah, M.J.1
Li, J.2
-
29
-
-
84910617916
-
Secureoutsourced attribute-based signatures
-
Dec.
-
X. Chen, J. Li, X. Huang, J. Li, Y. Xiang, D. S. Wong, "Secureoutsourced attribute-based signatures," IEEE Trans. Parallel Distrib.Syst., vol. 25, no. 12, pp. 3285-3294, Dec. 2014.
-
(2014)
IEEE Trans. Parallel Distrib.Syst.
, vol.25
, Issue.12
, pp. 3285-3294
-
-
Chen, X.1
Li, J.2
Huang, X.3
Li, J.4
Xiang, Y.5
Wong, D.S.6
-
30
-
-
84906655458
-
Efficient computation outsourcingfor inverting a class of homomorphic functions
-
Dec.
-
F. Zhang, X. Ma, S. Liu, "Efficient computation outsourcingfor inverting a class of homomorphic functions," Inf. Sci., vol. 286,pp. 19-28, Dec. 2014.
-
(2014)
Inf. Sci.
, vol.286
, pp. 19-28
-
-
Zhang, F.1
Ma, X.2
Liu, S.3
-
31
-
-
84945431187
-
Dynamic remotedata auditing for securing big data storage in cloud computing
-
Sep.
-
M. Sookhak, A. Gania, M. K. Khanb, R. Buyyac, "Dynamic remotedata auditing for securing big data storage in cloud computing," Inf. Sci.,Sep. 2105, doi: 10.1016/j.ins.2015.09.004.
-
Inf. Sci.
, vol.2105
-
-
Sookhak, M.1
Gania, A.2
Khanb, M.K.3
Buyyac, R.4
-
32
-
-
84951288033
-
Symmetric-key basedproofs of retrievability supporting public verification
-
C. Guan, K. Ren, F. Zhang, K. Florian, J. Yu, "Symmetric-key basedproofs of retrievability supporting public verification," in Proc. 20th Eur.Symp. Res. Comput. Secur. (ESORICS), 2015, pp. 203-223.
-
(2015)
Proc. 20th Eur.Symp. Res. Comput. Secur. (ESORICS)
, pp. 203-223
-
-
Guan, C.1
Ren, K.2
Zhang, F.3
Florian, K.4
Yu, J.5
-
33
-
-
84962382590
-
Enablingpublic auditing for shared data in cloud storage supporting identityprivacy and traceability
-
Mar.
-
G. Yang, J. Yu, W. Shen, Q. Su, Z. Fu, R. Hao, "Enablingpublic auditing for shared data in cloud storage supporting identityprivacy and traceability," J. Syst. Softw., vol. 113, pp. 130-139,Mar. 2016.
-
(2016)
J. Syst. Softw.
, vol.113
, pp. 130-139
-
-
Yang, G.1
Yu, J.2
Shen, W.3
Su, Q.4
Fu, Z.5
Hao, R.6
-
34
-
-
84901836903
-
One forward-securesignature scheme using bilinear maps and its applications
-
Sep.
-
J. Yu, F. Kong, X. Cheng, R. Hao, G. Li, "One forward-securesignature scheme using bilinear maps and its applications," Inf. Sci.,vol. 279, pp. 60-76, Sep. 2014.
-
(2014)
Inf. Sci.
, vol.279
, pp. 60-76
-
-
Yu, J.1
Kong, F.2
Cheng, X.3
Hao, R.4
Li, G.5
-
35
-
-
84949654521
-
IRIBE: Intrusionresilientidentity-based encryption
-
Feb.
-
J. Yu, R. Hao, H. Zhao, M. Shu, J. Fan, "IRIBE: Intrusionresilientidentity-based encryption," Inf. Sci., vol. 329, pp. 90-104,Feb. 2016.
-
(2016)
Inf. Sci.
, vol.329
, pp. 90-104
-
-
Yu, J.1
Hao, R.2
Zhao, H.3
Shu, M.4
Fan, J.5
|