-
1
-
-
77956137294
-
Cryptographic cloud storage
-
(R. Sion, R. Curtmola, S. Dietrich, A. Kiayias, J. M. Miret, K. Sako, and F. Seb, eds.) Springer Berlin Heidelberg, Jan
-
S. Kamara and K. Lauter, "Cryptographic Cloud Storage," in Financial Cryptography and Data Security (R. Sion, R. Curtmola, S. Dietrich, A. Kiayias, J. M. Miret, K. Sako, and F. Seb, eds.), no. 6054 in Lecture Notes in Computer Science, pp. 136-149, Springer Berlin Heidelberg, Jan. 2010.
-
(2010)
Financial Cryptography and Data Security 6054 in Lecture Notes in Computer Science
, pp. 136-149
-
-
Kamara, S.1
Lauter, K.2
-
4
-
-
74049103479
-
Pors: Proofs of retrievability for large files
-
(New York, NY, USA) ACM
-
A. Juels and B. S. Kaliski, Jr., "Pors: Proofs of Retrievability for Large Files," in Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07, (New York, NY, USA), pp. 584-597, ACM, 2007.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07
, pp. 584-597
-
-
Juels, A.1
Kaliski, B.S.2
-
5
-
-
79959823910
-
Remote data checking using provable data possession
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song, "Remote Data Checking Using Provable Data Possession," ACM Trans. Inf. Syst. Secur., vol. 14, no. 1, pp. 12:1-12:34, 2011.
-
(2011)
ACM Trans. Inf. Syst. Secur
, vol.14
, Issue.1
, pp. 121-1234
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Khan, O.5
Kissner, L.6
Peterson, Z.7
Song, D.8
-
6
-
-
58349118819
-
Compact proofs of retrievability
-
(J. Pieprzyk, ed.) Springer Berlin Heidelberg
-
H. Shacham and B. Waters, "Compact Proofs of Retrievability," in Advances in Cryptology-ASIACRYPT 2008 (J. Pieprzyk, ed.), no. 5350 in Lecture Notes in Computer Science, pp. 90-107, Springer Berlin Heidelberg, 2008.
-
(2008)
Advances in Cryptology-ASIACRYPT 2008 5350 in Lecture Notes in Computer Science
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
7
-
-
84888986259
-
Practical dynamic proofs of retrievability
-
(New York, NY, USA) ACM
-
E. Shi, E. Stefanov, and C. Papamanthou, "Practical Dynamic Proofs of Retrievability," in Proceedings of the 2013 ACM SIGSAC Conference on Computer &38; Communications Security, CCS '13, (New York, NY, USA), pp. 325-336, ACM, 2013.
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer &38; Communications Security, CCS '13
, pp. 325-336
-
-
Shi, E.1
Stefanov, E.2
Papamanthou, C.3
-
8
-
-
84910598312
-
Outsourced proofs of retrievability
-
(New York, NY, USA) , ACM
-
F. Armknecht, J.-M. Bohli, G. O. Karame, Z. Liu, and C. A. Reuter, "Outsourced Proofs of Retrievability," in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, (New York, NY, USA), pp. 831-843, ACM, 2014.
-
(2014)
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14
, pp. 831-843
-
-
Armknecht, F.1
Bohli, J.-M.2
Karame, G.O.3
Liu, Z.4
Reuter, C.A.5
-
9
-
-
51849117195
-
MR-PDP: Multiple-replica provable data possession
-
June
-
R. Curtmola, O. Khan, R. Burns, and G. Ateniese, "MR-PDP: Multiple-Replica Provable Data Possession," in The 28th International Conference on Distributed Computing Systems, 2008. ICDCS '08, pp. 411-420, June 2008.
-
(2008)
The 28th International Conference on Distributed Computing Systems, 2008. ICDCS '08
, pp. 411-420
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
Ateniese, G.4
-
10
-
-
74049144464
-
HAIL: A high-availability and integrity layer for cloud storage
-
(New York, NY, USA) ACM
-
K. D. Bowers, A. Juels, and A. Oprea, "HAIL: A High-availability and Integrity Layer for Cloud Storage," in Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09, (New York, NY, USA), pp. 187-198, ACM, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09
, pp. 187-198
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
11
-
-
79951957726
-
A survey on network codes for distributed storage
-
Mar
-
A. Dimakis, K. Ramchandran, Y.Wu, and C. Suh, "A Survey on Network Codes for Distributed Storage," Proceedings of the IEEE, vol. 99, pp. 476-489, Mar. 2011.
-
(2011)
Proceedings of the IEEE
, vol.99
, pp. 476-489
-
-
Dimakis, A.1
Ramchandran, K.2
Wu, Y.3
Suh, C.4
-
12
-
-
84861630520
-
LT codes-based secure and reliable cloud storage service
-
Mar
-
N. Cao, S. Yu, Z. Yang, W. Lou, and Y. Hou, "LT codes-based secure and reliable cloud storage service," in 2012 Proceedings IEEE INFOCOM, pp. 693-701, Mar. 2012.
-
(2012)
2012 Proceedings IEEE INFOCOM
, pp. 693-701
-
-
Cao, N.1
Yu, S.2
Yang, Z.3
Lou, W.4
Hou, Y.5
-
13
-
-
77955726417
-
Network coding for distributed storage systems
-
Sept
-
A. Dimakis, P. Godfrey, Y. Wu, M. Wainwright, and K. Ramchandran, "Network Coding for Distributed Storage Systems," IEEE Transactions on Information Theory, vol. 56, pp. 4539-4551, Sept. 2010.
-
(2010)
IEEE Transactions on Information Theory
, vol.56
, pp. 4539-4551
-
-
Dimakis, A.1
Godfrey, P.2
Wu, Y.3
Wainwright, M.4
Ramchandran, K.5
-
14
-
-
79961002025
-
Optimal exact-regenerating codes for distributed storage at the MSR and MBR points via a product-matrix construction
-
K. Rashmi, N. Shah, and P. Kumar, "Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction," IEEE Transactions on Information Theory, vol. 57, no. 8, pp. 5227-5239, 2011.
-
(2011)
IEEE Transactions on Information Theory
, vol.57
, Issue.8
, pp. 5227-5239
-
-
Rashmi, K.1
Shah, N.2
Kumar, P.3
-
15
-
-
78650081896
-
Remote data checking for network coding-based distributed storage systems
-
(New York, NY, USA) , ACM
-
B. Chen, R. Curtmola, G. Ateniese, and R. Burns, "Remote Data Checking for Network Coding-based Distributed Storage Systems," in Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, CCSW '10, (New York, NY, USA), pp. 31-42, ACM, 2010.
-
(2010)
Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, CCSW '10
, pp. 31-42
-
-
Chen, B.1
Curtmola, R.2
Ateniese, G.3
Burns, R.4
-
17
-
-
84891802796
-
Enabling data integrity protection in regenerating-coding-based cloud storage: Theory and implementation
-
H. Chen and P. Lee, "Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 407-416, 2014.
-
(2014)
IEEE Transactions on Parallel and Distributed Systems
, vol.25
, Issue.2
, pp. 407-416
-
-
Chen, H.1
Lee, P.2
-
18
-
-
84883074898
-
Exact cooperative regenerating codes with minimum-repair-bandwidth for distributed storage
-
Apr
-
A. Wang and Z. Zhang, "Exact cooperative regenerating codes with minimum-repair-bandwidth for distributed storage," in 2013 Proceedings IEEE INFOCOM, pp. 400-404, Apr. 2013.
-
(2013)
2013 Proceedings IEEE INFOCOM
, pp. 400-404
-
-
Wang, A.1
Zhang, Z.2
-
19
-
-
0034229404
-
Network information flow
-
R. Ahlswede, N. Cai, S.-Y. Li, and R. Yeung, "Network information flow," IEEE Transactions on Information Theory, vol. 46, no. 4, pp. 1204-1216, 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.-Y.3
Yeung, R.4
-
20
-
-
84883101272
-
Analysis and construction of functional regenerating codes with uncoded repair for distributed storage systems
-
Apr
-
Y. Hu, P. Lee, and K. Shum, "Analysis and construction of functional regenerating codes with uncoded repair for distributed storage systems," in 2013 Proceedings IEEE INFOCOM, pp. 2355-2363, Apr. 2013.
-
(2013)
2013 Proceedings IEEE INFOCOM
, pp. 2355-2363
-
-
Hu, Y.1
Lee, P.2
Shum, K.3
-
21
-
-
84890540954
-
NCCloud: A network-coding-based storage system in a cloud-of-clouds
-
H. Chen, Y. Hu, P. Lee, and Y. Tang, "NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds," IEEE Transactions on Computers, vol. 63, no. 1, pp. 31-44, 2014.
-
(2014)
IEEE Transactions on Computers
, vol.63
, Issue.1
, pp. 31-44
-
-
Chen, H.1
Hu, Y.2
Lee, P.3
Tang, Y.4
-
22
-
-
84904420687
-
Cooperative repair with minimum-storage regenerating codes for distributed storage
-
Apr
-
J. Li and B. Li, "Cooperative repair with minimum-storage regenerating codes for distributed storage," in 2014 Proceedings IEEE INFOCOM, pp. 316-324, Apr. 2014.
-
(2014)
2014 Proceedings IEEE INFOCOM
, pp. 316-324
-
-
Li, J.1
Li, B.2
-
23
-
-
78650008717
-
Efficient provable data possession for hybrid clouds
-
(New York, NY, USA) ACM
-
Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S. Yau, "Efficient Provable Data Possession for Hybrid Clouds," in Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10, (New York, NY, USA), pp. 756-758, ACM, 2010.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10
, pp. 756-758
-
-
Zhu, Y.1
Wang, H.2
Hu, Z.3
Ahn, G.-J.4
Hu, H.5
Yau, S.S.6
-
24
-
-
84863270564
-
Collaborative integrity verification in hybrid clouds
-
Y. Zhu, H. Hu, G.-J. Ahn, Y. Han, and S. Chen, "Collaborative integrity verification in hybrid clouds," in 2011 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 191-200, 2011.
-
(2011)
2011 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)
, pp. 191-200
-
-
Zhu, Y.1
Hu, H.2
Ahn, G.-J.3
Han, Y.4
Chen, S.5
-
26
-
-
77949614836
-
Explicit construction of optimal exact regenerating codes for distributed storage
-
Sept
-
K. Rashmi, N. Shah, P. Kumar, and K. Ramchandran, "Explicit construction of optimal exact regenerating codes for distributed storage," in 47th Annual Allerton Conference on Communication, Control, and Computing, 2009. Allerton 2009, pp. 1243-1249, Sept. 2009.
-
(2009)
47th Annual Allerton Conference on Communication, Control, and Computing, 2009. Allerton 2009
, pp. 1243-1249
-
-
Rashmi, K.1
Shah, N.2
Kumar, P.3
Ramchandran, K.4
-
27
-
-
23044435711
-
Short signatures from the weil pairing
-
July
-
D. Boneh, B. Lynn, and H. Shacham, "Short Signatures from the Weil Pairing," Journal of Cryptology, vol. 17, pp. 297-319, July 2004.
-
(2004)
Journal of Cryptology
, vol.17
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
28
-
-
84861602545
-
Simple regenerating codes: Network coding for cloud storage
-
Mar
-
D. Papailiopoulos, J. Luo, A. Dimakis, C. Huang, and J. Li, "Simple regenerating codes: Network coding for cloud storage," in 2012 Proceedings IEEE INFOCOM, pp. 2801-2805, Mar. 2012.
-
(2012)
2012 Proceedings IEEE INFOCOM
, pp. 2801-2805
-
-
Papailiopoulos, D.1
Luo, J.2
Dimakis, A.3
Huang, C.4
Li, J.5
-
29
-
-
35048854587
-
An efficient signature scheme from bilinear pairings and its applications
-
(F. Bao, R. Deng, and J. Zhou, eds.) Springer Berlin Heidelberg
-
F. Zhang, R. Safavi-Naini, and W. Susilo, "An Efficient Signature Scheme from Bilinear Pairings and Its Applications," in Public Key Cryptography-PKC 2004 (F. Bao, R. Deng, and J. Zhou, eds.), no. 2947 in Lecture Notes in Computer Science, pp. 277-290, Springer Berlin Heidelberg, 2004.
-
(2004)
Public Key Cryptography-PKC 2004 2947 in Lecture Notes in Computer Science
, pp. 277-290
-
-
Zhang, F.1
Safavi-Naini, R.2
Susilo, W.3
-
30
-
-
84878998883
-
Compact proofs of retrievability
-
Sept
-
H. Shacham and B. Waters, "Compact Proofs of Retrievability," Journal of Cryptology, vol. 26, pp. 442-483, Sept. 2012.
-
(2012)
Journal of Cryptology
, vol.26
, pp. 442-483
-
-
Shacham, H.1
Waters, B.2
|