-
1
-
-
79960257802
-
Cryptography goes to the cloud
-
I. Agudo, D. Nuñez, G. Giammatteo, P. Rizomiliotis, and C. Lambrinoudakis, "Cryptography goes to the cloud," in Proc. Secure and Trust Computing, Data Management, and Applicat. (STA 2011 Workshops), 2011, pp. 190-197.
-
(2011)
Proc. Secure and Trust Computing, Data Management, and Applicat. (STA 2011 Workshops)
, pp. 190-197
-
-
Agudo, I.1
Nuñez, D.2
Giammatteo, G.3
Rizomiliotis, P.4
Lambrinoudakis, C.5
-
3
-
-
84951873931
-
Leakage-resilient identification schemes from zero-knowledge proofs of storage
-
G. Ateniese, A. Faonio, and S. Kamara, "Leakage-resilient identification schemes from zero-knowledge proofs of storage," in Proc. IMA Int. Conf. Cryptogr. Coding, 2015, pp. 311-328.
-
(2015)
Proc. IMA Int. Conf. Cryptogr. Coding
, pp. 311-328
-
-
Ateniese, G.1
Faonio, A.2
Kamara, S.3
-
4
-
-
70249129465
-
Scalable and efficient provable data possession
-
G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik, "Scalable and efficient provable data possession," in Proc. 4th Int. Conf. Secure Privacy Commun. Netw. (SecureComm), 2008, pp. 1-10.
-
(2008)
Proc. 4th Int. Conf. Secure Privacy Commun. Netw. (SecureComm)
, pp. 1-10
-
-
Ateniese, G.1
Di Pietro, R.2
Mancini, L.V.3
Tsudik, G.4
-
5
-
-
74049136395
-
Proofs of retrievability: Theory and implementation
-
K. D. Bowers, A. Juels, and A. Oprea, "Proofs of retrievability: Theory and implementation," in Proc. ACM Workshop Cloud Comput. Secur. (CCSW), 2009, pp. 43-54.
-
(2009)
Proc. ACM Workshop Cloud Comput. Secur. (CCSW)
, pp. 43-54
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
6
-
-
84885645897
-
Using algebraic signatures to check data possession in cloud storage
-
L. Chen, "Using algebraic signatures to check data possession in cloud storage," Future Generat. Comput. Syst., vol. 29, no. 7, pp. 1709-1715, 2013.
-
(2013)
Future Generat. Comput. Syst.
, vol.29
, Issue.7
, pp. 1709-1715
-
-
Chen, L.1
-
7
-
-
70350681128
-
Proofs of retrievability via hardness amplification
-
Y. Dodis, S. Vadhan, and D. Wichs, "Proofs of retrievability via hardness amplification," in Proc. Theory Cryptogr. Conf. (TCC), 2009, pp. 109-127.
-
(2009)
Proc. Theory Cryptogr. Conf. (TCC)
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.2
Wichs, D.3
-
8
-
-
74049121230
-
Dynamic provable data possession
-
C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, "Dynamic provable data possession," in Proc. 16th ACM Conf. Comput. Commun. Secur. (CCS), 2009, pp. 213-222.
-
(2009)
Proc. 16th ACM Conf. Comput. Commun. Secur. (CCS)
, pp. 213-222
-
-
Erway, C.1
Küpçü, A.2
Papamanthou, C.3
Tamassia, R.4
-
9
-
-
84905221667
-
On indistinguishability in remote data integrity checking
-
X. Fan, G. Yang, Y. Mu, and Y. Yu, "On indistinguishability in remote data integrity checking," Comput. J., vol. 58, no. 4, pp. 823-830, 2015.
-
(2015)
Comput. J.
, vol.58
, Issue.4
, pp. 823-830
-
-
Fan, X.1
Yang, G.2
Mu, Y.3
Yu, Y.4
-
10
-
-
84947265833
-
A new public remote integrity checking scheme with user privacy
-
Y. Feng, Y. Mu, G. Yang, and J. K. Liu, "A new public remote integrity checking scheme with user privacy," in Proc. 20th Austral. Conf. Inf. Secur. Privacy (ACISP), 2015, pp. 377-394.
-
(2015)
Proc. 20th Austral. Conf. Inf. Secur. Privacy (ACISP)
, pp. 377-394
-
-
Feng, Y.1
Mu, Y.2
Yang, G.3
Liu, J.K.4
-
11
-
-
84982135416
-
Enabling personalized search over encrypted outsourced data with efficiency improvement
-
to be published
-
Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, "Enabling personalized search over encrypted outsourced data with efficiency improvement," IEEE Trans. Parallel Distrib. Syst., to be published, doi: 10.1109/TPDS.2015.2506573.
-
IEEE Trans. Parallel Distrib. Syst.
-
-
Fu, Z.1
Ren, K.2
Shu, J.3
Sun, X.4
Huang, F.5
-
12
-
-
84922280033
-
Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing
-
Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, "Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing," IEICE Trans. Commun., vol. E98-B, no. 1, pp. 190-200, 2015.
-
(2015)
IEICE Trans. Commun.
, vol.E98-B
, Issue.1
, pp. 190-200
-
-
Fu, Z.1
Sun, X.2
Liu, Q.3
Zhou, L.4
Shu, J.5
-
13
-
-
79960900327
-
A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability
-
Mar.
-
Z. Hao, S. Zhong, and N. Yu, "A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability," IEEE Trans. Knowl. Data Eng., vol. 23, no. 9, pp. 1432-1437, Mar. 2011.
-
(2011)
IEEE Trans. Knowl. Data Eng.
, vol.23
, Issue.9
, pp. 1432-1437
-
-
Hao, Z.1
Zhong, S.2
Yu, N.3
-
15
-
-
84928105578
-
Insecurity of an efficient privacy-preserving public auditing scheme for cloud data storage
-
H. Liu, L. Chen, Z. Davar, and M. Pour, "Insecurity of an efficient privacy-preserving public auditing scheme for cloud data storage," J. Universal Comput. Sci., vol. 21, no. 3, pp. 473-482, 2015.
-
(2015)
J. Universal Comput. Sci.
, vol.21
, Issue.3
, pp. 473-482
-
-
Liu, H.1
Chen, L.2
Davar, Z.3
Pour, M.4
-
16
-
-
85050702776
-
Fine-grained twofactor access control for Web-based cloud computing services
-
Mar.
-
J. K. Liu, M. H. Au, X. Huang, R. Lu, and J. Li, "Fine-grained twofactor access control for Web-based cloud computing services," IEEE Trans. Inf. Forensics Security, vol. 11, no. 3, pp. 484-497, Mar. 2016.
-
(2016)
IEEE Trans. Inf. Forensics Security
, vol.11
, Issue.3
, pp. 484-497
-
-
Liu, J.K.1
Au, M.H.2
Huang, X.3
Lu, R.4
Li, J.5
-
17
-
-
77955088735
-
Efficient online/offline identity-based signature for wireless sensor network
-
J. K. Liu, J. Baek, J. Zhou, Y. Yang, and J. W. Wong, "Efficient online/offline identity-based signature for wireless sensor network," Int. J. Inf. Secur., vol. 9, no. 4, pp. 287-296, 2010.
-
(2010)
Int. J. Inf. Secur.
, vol.9
, Issue.4
, pp. 287-296
-
-
Liu, J.K.1
Baek, J.2
Zhou, J.3
Yang, Y.4
Wong, J.W.5
-
18
-
-
84969869837
-
Two-factor data security protection mechanism for cloud storage system
-
Jun.
-
J. K. Liu, K. Liang, W. Susilo, J. Liu, and Y. Xiang, "Two-factor data security protection mechanism for cloud storage system," IEEE Trans. Comput., vol. 65, no. 6, pp. 1992-2004, Jun. 2016.
-
(2016)
IEEE Trans. Comput.
, vol.65
, Issue.6
, pp. 1992-2004
-
-
Liu, J.K.1
Liang, K.2
Susilo, W.3
Liu, J.4
Xiang, Y.5
-
19
-
-
34247356209
-
Addressing the shortcomings of one-way chains
-
R. Di Pietro, L. V. Mancini, A. Durante, and V. Patil, "Addressing the shortcomings of one-way chains," in Proc. ACM Symp. Inf., Comput. Commun. Secur. (ASIACCS), 2006, pp. 289-296.
-
(2006)
Proc. ACM Symp. Inf., Comput. Commun. Secur. (ASIACCS)
, pp. 289-296
-
-
Di Pietro, R.1
Mancini, L.V.2
Durante, A.3
Patil, V.4
-
21
-
-
84928106743
-
Mutual verifiable provable data auditing in public cloud storage
-
Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, "Mutual verifiable provable data auditing in public cloud storage," J. Internet Technol., vol. 16, no. 2, pp. 317-323, 2015.
-
(2015)
J. Internet Technol.
, vol.16
, Issue.2
, pp. 317-323
-
-
Ren, Y.1
Shen, J.2
Wang, J.3
Han, J.4
Lee, S.5
-
22
-
-
46649083439
-
Efficient remote data possession checking in critical information infrastructures
-
Aug.
-
F. Sebe, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, and J.-J. Quisquater, "Efficient remote data possession checking in critical information infrastructures," IEEE Trans. Knowl. Data Eng., vol. 20, no. 8, pp. 1034-1038, Aug. 2008.
-
(2008)
IEEE Trans. Knowl. Data Eng.
, vol.20
, Issue.8
, pp. 1034-1038
-
-
Sebe, F.1
Domingo-Ferrer, J.2
Martinez-Balleste, A.3
Deswarte, Y.4
Quisquater, J.-J.5
-
25
-
-
84861959172
-
Privacypreserving public auditing for secure cloud storage
-
Feb.
-
C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, "Privacypreserving public auditing for secure cloud storage," IEEE Trans. Comput., vol. 62, no. 2, pp. 362-375, Feb. 2013.
-
(2013)
IEEE Trans. Comput.
, vol.62
, Issue.2
, pp. 362-375
-
-
Wang, C.1
Chow, S.S.M.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
26
-
-
70449569012
-
Ensuring data storage security in cloud computing
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring data storage security in cloud computing," in Proc. 17th Int. Workshop Quality Service (IWQoS), 2009, pp. 1-9.
-
(2009)
Proc. 17th Int. Workshop Quality Service (IWQoS)
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
27
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
Mar.
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for data storage security in cloud computing," in Proc. IEEE Int. Conf. Comput. Commun. (INFOCOM), Mar. 2010, pp. 1-9.
-
(2010)
Proc. IEEE Int. Conf. Comput. Commun. (INFOCOM)
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
28
-
-
79953294892
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
May
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling public verifiability and data dynamics for storage security in cloud computing," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 5, pp. 847-859, May 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
29
-
-
84902317194
-
Secure and efficient privacypreserving public auditing scheme for cloud storage
-
S. Worku, C. Xu, J. Zhao, and X. He, "Secure and efficient privacypreserving public auditing scheme for cloud storage," Comput. Elect. Eng., vol. 40, no. 5, pp. 1703-1713, 2014.
-
(2014)
Comput. Elect. Eng.
, vol.40
, Issue.5
, pp. 1703-1713
-
-
Worku, S.1
Xu, C.2
Zhao, J.3
He, X.4
-
30
-
-
84867487685
-
Cryptanalysis of Wang's auditing protocol for data storage security in cloud computing
-
C. Xu, X. He, and D. Abraha-Weldemariam, "Cryptanalysis of Wang's auditing protocol for data storage security in cloud computing," in Proc. Inform. Computing and Applicat. (ICICA 2012), 2012, pp. 422-428.
-
(2012)
Proc. Inform. Computing and Applicat. (ICICA 2012)
, pp. 422-428
-
-
Xu, C.1
He, X.2
Abraha-Weldemariam, D.3
-
31
-
-
84962448916
-
A secure and dynamic multikeyword ranked search scheme over encrypted cloud data
-
Feb.
-
Z. Xia, X. Wang, X. Sun, and Q. Wang, "A secure and dynamic multikeyword ranked search scheme over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340-352, Feb. 2016.
-
(2016)
IEEE Trans. Parallel Distrib. Syst.
, vol.27
, Issue.2
, pp. 340-352
-
-
Xia, Z.1
Wang, X.2
Sun, X.3
Wang, Q.4
-
32
-
-
84951824554
-
Extended proxyassisted approach: Achieving revocable fine-grained encryption of cloud data
-
Y. Yang, J. K. Liu, K. Liang, K. Y. Choo, and J. Zhou, "Extended proxyassisted approach: Achieving revocable fine-grained encryption of cloud data," in Proc. 20th Eur. Symp. Res. Comput. Secur. (ESORICS), 2015, pp. 146-166.
-
(2015)
Proc. 20th Eur. Symp. Res. Comput. Secur. (ESORICS)
, pp. 146-166
-
-
Yang, Y.1
Liu, J.K.2
Liang, K.3
Choo, K.Y.4
Zhou, J.5
-
33
-
-
84934283890
-
Public integrity auditing for dynamic data sharing with multiuser modification
-
Aug.
-
J. Yuan and S. Yu, "Public integrity auditing for dynamic data sharing with multiuser modification," IEEE Trans. Inf. Forensics Security, vol. 10, no. 8, pp. 1717-1726, Aug. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.8
, pp. 1717-1726
-
-
Yuan, J.1
Yu, S.2
-
34
-
-
84922625583
-
Certificateless one-pass and two-party authenticated key agreement protocol and its extensions
-
Feb.
-
L. Zhang, "Certificateless one-pass and two-party authenticated key agreement protocol and its extensions," Inf. Sci., vol. 293, pp. 182-195, Feb. 2015.
-
(2015)
Inf. Sci.
, vol.293
, pp. 182-195
-
-
Zhang, L.1
-
35
-
-
84978708856
-
Privacypreserving vehicular communication authentication with hierarchical aggregation and fast response
-
Aug.
-
L. Zhang, C. Hu, Q. Wu, J. Domingo-Ferrer, and B. Qin, "Privacypreserving vehicular communication authentication with hierarchical aggregation and fast response," IEEE Trans. Comput., vol. 65, no. 8, pp. 2562-2574, Aug. 2016, doi: 10.1109/TC.2015.2485225.
-
(2016)
IEEE Trans. Comput.
, vol.65
, Issue.8
, pp. 2562-2574
-
-
Zhang, L.1
Hu, C.2
Wu, Q.3
Domingo-Ferrer, J.4
Qin, B.5
-
36
-
-
84960339093
-
Roundefficient and sender-unrestricted dynamic group key agreement protocol for secure group communications
-
Nov.
-
L. Zhang, Q. Wu, J. Domingo-Ferrer, B. Qin, and Z. Dong, "Roundefficient and sender-unrestricted dynamic group key agreement protocol for secure group communications," IEEE Trans. Inf. Forensics Security, vol. 10, no. 11, pp. 2352-2364, Nov. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.11
, pp. 2352-2364
-
-
Zhang, L.1
Wu, Q.2
Domingo-Ferrer, J.3
Qin, B.4
Dong, Z.5
-
37
-
-
84978312778
-
Distributed aggregate privacy-preserving authentication in VANETs
-
to be published
-
L. Zhang, Q. Wu, J. Domingo-Ferrer, B. Qin, and C. Hu, "Distributed aggregate privacy-preserving authentication in VANETs," IEEE Trans. Intell. Transp. Syst., to be published, doi: 10.1109/TITS.2016.2579162.
-
IEEE Trans. Intell. Transp. Syst.
-
-
Zhang, L.1
Wu, Q.2
Domingo-Ferrer, J.3
Qin, B.4
Hu, C.5
-
38
-
-
77952252546
-
A scalable robust authentication protocol for secure vehicular communications
-
May
-
L. Zhang, Q. Wu, A. Solanas, and J. Domingo-Ferrer, "A scalable robust authentication protocol for secure vehicular communications," IEEE Trans. Veh. Technol., vol. 59, no. 4, pp. 1606-1617, May 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.4
, pp. 1606-1617
-
-
Zhang, L.1
Wu, Q.2
Solanas, A.3
Domingo-Ferrer, J.4
|