-
3
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese et al. Provable data possession at untrusted stores. In ACM CCS, pages 598-609, 2007.
-
(2007)
ACM CCS
, pp. 598-609
-
-
Ateniese, G.1
-
4
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
Springer-Verlag
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (im)possibility of obfuscating programs. In In Advances in Cryptology - CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 1-18. Springer-Verlag, 2001.
-
(2001)
Advances in Cryptology - CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
5
-
-
80755159951
-
-
submission. Referenced 2010 at eprint.iacr.org/2010/214
-
K. D. Bowers, M. van Dijk, A. Juels, A. Oprea, and R. Rivest. How to tell if your cloud files are vulnerable to drive crashes, 2010. In submission. Referenced 2010 at eprint.iacr.org/2010/214.
-
(2010)
How to tell if your cloud files are vulnerable to drive crashes
-
-
Bowers, K. D.1
van Dijk, M.2
Juels, A.3
Oprea, A.4
Rivest, R.5
-
6
-
-
0032201622
-
Privacy information retrieval
-
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan. Privacy information retrieval. J. ACM, 46(6):965-981, 1998.
-
(1998)
J. ACM
, vol.46
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
7
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
R. Chow et al. Controlling data in the cloud: Outsourcing computation without outsourcing control. In CCSW, 2009.
-
(2009)
CCSW
-
-
Chow, R.1
-
10
-
-
21644455412
-
Terra: a virtual machine-based platform for trusted computing
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: a virtual machine-based platform for trusted computing. In SOSP, pages 193-206, 2003.
-
(2003)
SOSP
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
11
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
C. Gentry. Fully homomorphic encryption using ideal lattices. In STOC, pages 169-178, 2009.
-
(2009)
STOC
, pp. 169-178
-
-
Gentry, C.1
-
12
-
-
71149116146
-
How to play any mental game - a completeness theorem for protocols with honest majority
-
Preliminary version in FOCS'86
-
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game - a completeness theorem for protocols with honest majority. J. of the ACM, 38(1):691-729, 1991. Preliminary version in FOCS'86.
-
(1991)
J. of the ACM
, vol.38
, Issue.1
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
14
-
-
38049056625
-
Obfuscation for cryptographic purposes
-
D. Hofheinz, J. Malone-lee, and M. Stam. Obfuscation for cryptographic purposes. In In TCC 2007, LNCS 4392, pages 214-232, 2007.
-
(2007)
TCC 2007, LNCS
, vol.4392
, pp. 214-232
-
-
Hofheinz, D.1
Malone-lee, J.2
Stam, M.3
-
15
-
-
38049073133
-
Securely obfuscating re-encryption
-
S. Hohenberger, G. N. Rothblum, a. shelat, and V. Vaikuntanathan. Securely obfuscating re-encryption. In In TCC 2007, LNCS 4392, pages 233-252, 2007.
-
(2007)
TCC 2007, LNCS
, vol.4392
, pp. 233-252
-
-
Hohenberger, S.1
Rothblum, G. N.2
shelat, a.3
Vaikuntanathan, V.4
-
17
-
-
74049103479
-
PORs-proofs of retrievability for large files
-
ACM
-
A. Juels and B. Kaliski. PORs-proofs of retrievability for large files. In ACM CCS 2007, pages 584-597. ACM, 2007.
-
(2007)
ACM CCS 2007
, pp. 584-597
-
-
Juels, A.1
Kaliski, B.2
-
18
-
-
35048895442
-
Positive results and techniques for obfuscation
-
B. Lynn, M. Prabhakaran, and A. Sahai. Positive results and techniques for obfuscation. In In Advances in Cryptology - EURO-CRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 20-39, 2004.
-
(2004)
Advances in Cryptology - EURO-CRYPT 2004, volume 3027 of Lecture Notes in Computer Science
, pp. 20-39
-
-
Lynn, B.1
Prabhakaran, M.2
Sahai, A.3
-
19
-
-
77649264413
-
A first glimpse of cryptography's Holy Grail
-
March
-
D. Micciancio. A first glimpse of cryptography's Holy Grail. C. ACM, 53(3):96, March 2010.
-
(2010)
C. ACM
, vol.53
, Issue.3
, pp. 96
-
-
Micciancio, D.1
-
22
-
-
70350649061
-
Predicate privacy in encryption systems
-
E. Shen, E. Shi, and B. Waters. Predicate privacy in encryption systems. In TCC, pages 457-473, 2009.
-
(2009)
TCC
, pp. 457-473
-
-
Shen, E.1
Shi, E.2
Waters, B.3
-
23
-
-
0033705124
-
Multi-dimensional range query over encrypted data
-
D. Song, D. Wagner, and A. Perrig. Multi-dimensional range query over encrypted data. In IEEE S&P, pages 44-55, 2000.
-
(2000)
IEEE S&P
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
24
-
-
80051997870
-
Companies slowly join cloud-computing
-
page 19 April
-
B. Stone and A. Vance. Companies slowly join cloud-computing. New York Times, page B1, 19 April 2010.
-
(2010)
New York Times
, pp. B1
-
-
Stone, B.1
Vance, A.2
-
28
-
-
0020312165
-
Protocols for secure computations (extended abstract)
-
A. C. Yao. Protocols for secure computations (extended abstract). In FOCS, pages 160-164, 1982.
-
(1982)
FOCS
, pp. 160-164
-
-
Yao, A. C.1
|