-
2
-
-
84978770670
-
-
[Online]
-
Google. (2005). Google drive. Google [Online]. Available: http://drive.google.com/
-
(2005)
Google Drive. Google
-
-
-
7
-
-
68249129760
-
-
University of California at Berkeley, Berkeley, CA, USA, Tech. Rep. UCBEECS-2009-28, Feb
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "Above the clouds: A berkeley view of cloud computing," University of California at Berkeley, Berkeley, CA, USA, Tech. Rep. UCBEECS-2009-28, pp. 1-23, Feb. 2009.
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
, pp. 1-23
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
8
-
-
0024641589
-
Efficient dispersal of information for security
-
Apr.
-
M. Rabin, "Efficient dispersal of information for security," J. ACM, vol. 36, no. 2, pp. 335-348, Apr. 1989.
-
(1989)
J. ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.1
-
10
-
-
74049102823
-
Provable data possession at untrusted stores
-
Oct.
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable data possession at untrusted stores," in Proc. 14th ACM Conf. Comput. Commun. Secur., Oct. 2007, pp. 598-609.
-
(2007)
Proc. 14th ACM Conf. Comput. Commun. Secur.
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
12
-
-
74049136395
-
Proofs of retrievability: Theory and implementation
-
Nov.
-
K. D. Bowers, A. Juels, and A. Oprea, "Proofs of retrievability: Theory and implementation," in Proc. ACM Workshop Cloud Comput. Secur., Nov. 2009, pp. 43-54.
-
(2009)
Proc. ACM Workshop Cloud Comput. Secur.
, pp. 43-54
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
13
-
-
70350681128
-
Proofs of retrievability via hardness amplification
-
Mar.
-
Y. Dodis, S. Vadhan, and D. Wichs, "Proofs of retrievability via hardness amplification," in Proc. 6th Theory Cryptography Conf. Theory Cryptography, Mar. 2009, pp. 109-127.
-
(2009)
Proc. 6th Theory Cryptography Conf. Theory Cryptography
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.2
Wichs, D.3
-
14
-
-
84978697360
-
Proofs of retrievability via hardness amplification
-
Sep.
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Proofs of retrievability via hardness amplification," in Proc. Eur. Symp. Res. Comput. Secur., Sep. 2009, pp. 355-370.
-
(2009)
Proc. Eur. Symp. Res. Comput. Secur.
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
15
-
-
74049121230
-
Dynamic provable data possession
-
Nov.
-
C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, "Dynamic provable data possession," in Proc. 16th ACM Conf. Comput. Comm. Secur., Nov. 2009, pp. 213-222.
-
(2009)
Proc. 16th ACM Conf. Comput. Comm. Secur.
, pp. 213-222
-
-
Erway, C.1
Kupcu, A.2
Papamanthou, C.3
Tamassia, R.4
-
16
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
Mar.
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for data storage security in cloud computing," in Proc. IEEE 29th Conf. Inform. Commun., Mar. 2010, pp. 525-533.
-
(2010)
Proc. IEEE 29th Conf. Inform. Commun.
, pp. 525-533
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
17
-
-
84878475706
-
Proofs of retrievability with public verifiability and constant communication cost in cloud
-
May
-
J. Yuan and S. Yu, "Proofs of retrievability with public verifiability and constant communication cost in cloud," in Proc. Int. Workshop Secur. Cloud Comput., May 2013, pp. 19-26.
-
(2013)
Proc. Int. Workshop Secur. Cloud Comput.
, pp. 19-26
-
-
Yuan, J.1
Yu, S.2
-
18
-
-
84888986259
-
Practical dynamic proofs of retrievability
-
Nov.
-
E. Shi, E. Stefanov, and C. Papamanthou, "Practical dynamic proofs of retrievability," in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., Nov. 2013, pp. 325-336.
-
(2013)
Proc. ACM SIGSAC Conf. Comput. Commun. Secur.
, pp. 325-336
-
-
Shi, E.1
Stefanov, E.2
Papamanthou, C.3
-
20
-
-
84978714042
-
-
Online code editor. Codeanywhere [Online]
-
Codeanywhere. (2011). Online code editor. Codeanywhere [Online]. Available: https://codeanywhere.net/
-
(2011)
Codeanywhere
-
-
-
21
-
-
84978730008
-
-
Online code editor. Cloud IDE [Online]
-
eXo Cloud IDE. (2002). Online code editor. Cloud IDE [Online]. Available: https://codenvy.com/
-
(2002)
-
-
eXo Cloud IDE1
-
22
-
-
84866761388
-
Oruta: Privacy-preserving public auditing for shared data in the cloud
-
Jun.
-
B. Wang, B. Li, and H. Li, "Oruta: Privacy-preserving public auditing for shared data in the cloud," in Proc. IEEE 5th Int. Conf. Cloud Comput., Jun. 2012, pp. 295-302.
-
(2012)
Proc. IEEE 5th Int. Conf. Cloud Comput.
, pp. 295-302
-
-
Wang, B.1
Li, B.2
Li, H.3
-
23
-
-
84883057189
-
Public auditing for shared data with efficient user revocation in the cloud
-
Apr.
-
B. Wang, L. Baochun, and L. Hui, "Public auditing for shared data with efficient user revocation in the cloud," in Proc. IEEE INFOCOM, Apr. 2013, pp. 2904-2912.
-
(2013)
Proc. IEEE INFOCOM
, pp. 2904-2912
-
-
Wang, B.1
Baochun, L.2
Hui, L.3
-
24
-
-
84904430603
-
Efficient public integrity checking for cloud data sharing with multi-user modification
-
Apr.
-
J. Yuan and S. Yu, "Efficient public integrity checking for cloud data sharing with multi-user modification," in Proc. IEEE INFOCOM, Apr. 2014, pp. 2121-2129.
-
(2014)
Proc. IEEE INFOCOM
, pp. 2121-2129
-
-
Yuan, J.1
Yu, S.2
-
26
-
-
77955043127
-
Asymmetric group key agreement
-
Apr.
-
Q. Wu, Y. Mu, W. Susilo, B. Qin, and J. Domingo-Ferrer, "Asymmetric group key agreement," in Proc. 28th Annu. Int. Conf. Theory Appl. Cryptographic Techn., Apr. 2009, pp. 153-170.
-
(2009)
Proc. 28th Annu. Int. Conf. Theory Appl. Cryptographic Techn.
, pp. 153-170
-
-
Wu, Q.1
Mu, Y.2
Susilo, W.3
Qin, B.4
Domingo-Ferrer, J.5
-
28
-
-
84946840347
-
Short signatures from the Weil pairing
-
Dec.
-
D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the Weil pairing," in Proc. 7th Int. Conf. Theory Appl Cryptol. Inform. Secur.: Adv. Cryptol., Dec. 2001, pp. 514-532.
-
(2001)
Proc. 7th Int. Conf. Theory Appl Cryptol. Inform. Secur.: Adv. Cryptol.
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
29
-
-
35048848152
-
Collision-free accumulators and fail-stop signature schemes without trees
-
May
-
D. Boneh and X. Boyen, "Collision-free accumulators and fail-stop signature schemes without trees," in Proc. EUROCRYPT, May 2004, pp. 56-73.
-
(2004)
Proc. EUROCRYPT
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
31
-
-
35048887476
-
Short group signatures
-
Aug.
-
D. Boneh, X. Boyen, and H. Shacham, "Short group signatures," in Proc. CRYPTO, Aug. 2004, pp. 41-55.
-
(2004)
Proc. CRYPTO
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
32
-
-
84955567079
-
Diffie-Hellman oracles
-
Aug.
-
U. M. Maurer and S. Wolf, "Diffie-Hellman oracles," in Proc. CRYPTO, Aug. 1996, pp. 268-282.
-
(1996)
Proc. CRYPTO
, pp. 268-282
-
-
Maurer, U.M.1
Wolf, S.2
-
33
-
-
0142156713
-
Variations of Diffie-Hellman proble
-
Oct.
-
F. Bao, R. Deng, and H. Zhu, "Variations of Diffie-Hellman proble," in Proc. Inform. Commun. Secur., Huhehaote, Oct. 2003, pp. 301-312.
-
(2003)
Proc. Inform. Commun. Secur., Huhehaote
, pp. 301-312
-
-
Bao, F.1
Deng, R.2
Zhu, H.3
-
34
-
-
84906510644
-
Verifiable computation over large database with incremental updates
-
Sep.
-
X. Chen, J. Li, J. Weng, J. Ma, and W. Lou, "Verifiable computation over large database with incremental updates," in Proc. Eur. Symp. Res. Comput. Secur., Sep. 2014, pp. 148-162.
-
(2014)
Proc. Eur. Symp. Res. Comput. Secur.
, pp. 148-162
-
-
Chen, X.1
Li, J.2
Weng, J.3
Ma, J.4
Lou, W.5
-
35
-
-
84962022357
-
New publicly verifiable databases with efficient updates
-
X. Chen, J. Li, X. Huang, J. Ma, and W. Lou, "New publicly verifiable databases with efficient updates," IEEE Trans. Depend. Secure Comput., 2014, doi: 10.1109/TDSC.2014.2366471.
-
(2014)
IEEE Trans. Depend. Secure Comput.
-
-
Chen, X.1
Li, J.2
Huang, X.3
Ma, J.4
Lou, W.5
-
37
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
Sep.
-
R. Gennaro, C. Gentry, and B. Parno, "Non-interactive verifiable computing: Outsourcing computation to untrusted workers," in Proc. 30th Annu. Conf. Adv. Cryptol., Sep. 2010, pp. 465-482.
-
(2010)
Proc. 30th Annu. Conf. Adv. Cryptol.
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
38
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
May
-
C. Gentry, "Fully homomorphic encryption using ideal lattices," in Proc. 41st Annu. ACM Symp. Theory Comput., May 2009, pp. 169-178.
-
(2009)
Proc. 41st Annu. ACM Symp. Theory Comput.
, pp. 169-178
-
-
Gentry, C.1
-
40
-
-
80051977699
-
Verifiable delegation of computation over large data sets
-
Aug.
-
S. Benabbas, R. Gennaro, and Y. Vahlis, "Verifiable delegation of computation over large data sets," in Proc. 31st Annu. Conf. Adv. Cryptol., Aug. 2011, pp. 111-131.
-
(2011)
Proc. 31st Annu. Conf. Adv. Cryptol.
, pp. 111-131
-
-
Benabbas, S.1
Gennaro, R.2
Vahlis, Y.3
-
41
-
-
84889045277
-
Verifiable delegation of computation on outsourced data
-
Nov.
-
M. Backes, D. Fiore, and R. M. Reischuk, "Verifiable delegation of computation on outsourced data," in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., Nov. 2013, pp. 863-874.
-
(2013)
Proc. ACM SIGSAC Conf. Comput. Commun. Secur.
, pp. 863-874
-
-
Backes, M.1
Fiore, D.2
Reischuk, R.M.3
-
43
-
-
84937429196
-
Efficient revocation in group signatures
-
Feb.
-
E. Bresson and J. Stern, "Efficient revocation in group signatures," in Proc. Public-Key Cryptography, Feb. 2001, pp. 190-206.
-
(2001)
Proc. Public-Key Cryptography
, pp. 190-206
-
-
Bresson, E.1
Stern, J.2
-
44
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
Aug.
-
J. Camenisch and A. Lysyanskaya, "Dynamic accumulators and application to efficient revocation of anonymous credentials," in Proc. 22nd Annu. Int. Cryptol. Conf. Adv. Cryptol., Aug. 2002, pp. 61-76.
-
(2002)
Proc. 22nd Annu. Int. Cryptol. Conf. Adv. Cryptol.
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
45
-
-
84957043547
-
Quasi-efficient revocation in group signatures
-
Mar.
-
G. Ateniese, D. Song, and G. Tsudik, "Quasi-efficient revocation in group signatures," in Proc. 6th Int. Conf. Financial Cryptography, Mar. 2002, pp. 183-197.
-
(2002)
Proc. 6th Int. Conf. Financial Cryptography
, pp. 183-197
-
-
Ateniese, G.1
Song, D.2
Tsudik, G.3
-
46
-
-
84978767152
-
Scalable group signatures with revocation
-
Aug.
-
B. Libert, T. Peters, and M. Yung, "Scalable group signatures with revocation," in Proc. Annu. Int. Conf. Theory Appl. Cryptographic Techn., Aug. 2002, pp. 61-76.
-
(2002)
Proc. Annu. Int. Conf. Theory Appl. Cryptographic Techn.
, pp. 61-76
-
-
Libert, B.1
Peters, T.2
Yung, M.3
-
47
-
-
84865491673
-
Group signatures with almostfor-free revocation
-
Aug.
-
B. Libert, T. Peters, and M. Yung, "Group signatures with almostfor-free revocation," in Proc. Annu. Int. Cryptol. Conf. Adv. Cryptol., Aug. 2012, pp. 571-589.
-
(2012)
Proc. Annu. Int. Cryptol. Conf. Adv. Cryptol.
, pp. 571-589
-
-
Libert, B.1
Peters, T.2
Yung, M.3
|