-
1
-
-
74049102823
-
Provable data possession at untrusted stores
-
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D., 2007. Provable data possession at untrusted stores. In: Proceedings of the ACM CCS 2007. pp. 598–610.
-
(2007)
Proceedings of the ACM CC
, pp. 598-610
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
2
-
-
0142156713
-
Variations of Diffie-Hellman problem
-
Bao, F., Deng, R., Zhu, H., 2003. Variations of Diffie-Hellman problem. In: Proceedings of the ICICS 2003. pp. 301–312.
-
(2003)
Proceedings of the ICIC
, pp. 301-312
-
-
Bao, F.1
Deng, R.2
Zhu, H.3
-
3
-
-
23044435711
-
Short signatures from the weil pairing
-
Boneh, D., Lynn, B., Shacham, H., Short signatures from the weil pairing. J. Cryptol. 17:4 (2004), 297–319.
-
(2004)
J. Cryptol.
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
4
-
-
84861630520
-
LT codes-based secure and reliable cloud storage service
-
In: March 25–30, 2012
-
Cao, N., Yu, S., Yang, Z., Lou, W., Hou, Y.T., 2012. LT codes-based secure and reliable cloud storage service. In: Proceedings of the IEEE INFOCOM 2012. March 25–30, 2012, pp. 693–701.
-
(2012)
Proceedings of the IEEE INFOCOM 2012
, pp. 693-701
-
-
Cao, N.1
Yu, S.2
Yang, Z.3
Lou, W.4
Hou, Y.T.5
-
5
-
-
84991088919
-
Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement
-
Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K., Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11:12 (2016), 2706–2716.
-
(2016)
IEEE Trans. Inf. Forensics Secur.
, vol.11
, Issue.12
, pp. 2706-2716
-
-
Fu, Z.1
Wu, X.2
Guan, C.3
Sun, X.4
Ren, K.5
-
6
-
-
84982135416
-
Enabling personalized search over encrypted outsourced data with efficiency improvement
-
Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F., Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27:9 (2016), 2546–2559.
-
(2016)
IEEE Trans. Parallel Distrib. Syst.
, vol.27
, Issue.9
, pp. 2546-2559
-
-
Fu, Z.1
Ren, K.2
Shu, J.3
Sun, X.4
Huang, F.5
-
7
-
-
85077359111
-
Enabling semantic search based on conceptual graphs over encrypted outsourced data
-
Fu, Z., Huang, F., Sun, X., Vasilakos, A., Yang, C., Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Serv. Comput., 2016, 10.1109/TSC.2016.2622697.
-
(2016)
IEEE Trans. Serv. Comput.
-
-
Fu, Z.1
Huang, F.2
Sun, X.3
Vasilakos, A.4
Yang, C.5
-
8
-
-
84951288033
-
Symmetric-key based proofs of retrievability supporting public verification
-
ESORICS’15. Vienna, Austria
-
Guan, C., Ren, K., Zhang, F., Kerschbaum, F., Yu, J., 2015. Symmetric-key based proofs of retrievability supporting public verification. In: Proceedings of the 20th European Symposium on Research in Computer Security, ESORICS’15. Vienna, Austria.
-
(2015)
Proceedings of the 20th European Symposium on Research in Computer Security
-
-
Guan, C.1
Ren, K.2
Zhang, F.3
Kerschbaum, F.4
Yu, J.5
-
9
-
-
0002670834
-
Message recovery for signature schemes based on the discrete logarithm problem
-
Kaisa, N., Rueppel, R., Message recovery for signature schemes based on the discrete logarithm problem. Des. Codes Cryptogr. 7:1 (1996), 61–81.
-
(1996)
Des. Codes Cryptogr.
, vol.7
, Issue.1
, pp. 61-81
-
-
Kaisa, N.1
Rueppel, R.2
-
10
-
-
84933037073
-
OPoR: enabling proof of retrievability in cloud computing with resource-constrained devices
-
Li, J., Tan, X., Chen, X., Wong, D.S., Xhafa, Fatos, OPoR: enabling proof of retrievability in cloud computing with resource-constrained devices. Cloud Comput. 3:2 (2014), 195–205.
-
(2014)
Cloud Comput.
, vol.3
, Issue.2
, pp. 195-205
-
-
Li, J.1
Tan, X.2
Chen, X.3
Wong, D.S.4
Xhafa, F.5
-
11
-
-
84906247213
-
Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates
-
Liu, C., Chen, J., Yang, T., Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates. IEEE Trans. Parallel Distrib. Syst. 25:9 (2014), 2234–2244.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.9
, pp. 2234-2244
-
-
Liu, C.1
Chen, J.2
Yang, T.3
-
12
-
-
84900353889
-
Public auditing for big data storage in cloud computing – a survey
-
In: Computational Science and Engineering, CSE
-
Liu, C., Ranjian, R., Zhang, X., Yang, C., Georgakopoulos, D., Chen, J., 2013. Public auditing for big data storage in cloud computing – a survey. In: Proceedings of the 16th IEEE International Conf. Computational Science and Engineering, CSE. pp. 1128–1135.
-
(2013)
Proceedings of the 16th IEEE International Conf
, pp. 1128-1135
-
-
Liu, C.1
Ranjian, R.2
Zhang, X.3
Yang, C.4
Georgakopoulos, D.5
Chen, J.6
-
13
-
-
84862907810
-
Security challenges for the public cloud
-
Ren, K., Wang, C., Wang, Q., Security challenges for the public cloud. IEEE Internet Comput. 16:1 (2012), 69–73.
-
(2012)
IEEE Internet Comput.
, vol.16
, Issue.1
, pp. 69-73
-
-
Ren, K.1
Wang, C.2
Wang, Q.3
-
14
-
-
84928106743
-
Mutual verifiable provable data auditing in public cloud storage
-
1
-
Ren, Y., Shen, J., Wang, J., Han, J., Lee, S., Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16:2 (2015), 317–323 1.
-
(2015)
J. Internet Technol.
, vol.16
, Issue.2
, pp. 317-323
-
-
Ren, Y.1
Shen, J.2
Wang, J.3
Han, J.4
Lee, S.5
-
16
-
-
85002614804
-
A public cloud storage auditing scheme for resource-constrained clients
-
Shen, W., Yu, J., Hao, R., Wang, X., A public cloud storage auditing scheme for resource-constrained clients. High Perform. Syst. Archit. 6:3 (2016), 121–130.
-
(2016)
High Perform. Syst. Archit.
, vol.6
, Issue.3
, pp. 121-130
-
-
Shen, W.1
Yu, J.2
Hao, R.3
Wang, X.4
-
17
-
-
85032613311
-
Dynamic-hash-table based public auditing for secure cloud storage
-
Tian, H., Chen, Y., Chang, C., Jiang, H., Huang, Y., Chen, Y., Liu, J., Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans. Serv. Comput., 2015, 1–14.
-
(2015)
IEEE Trans. Serv. Comput.
, pp. 1-14
-
-
Tian, H.1
Chen, Y.2
Chang, C.3
Jiang, H.4
Huang, Y.5
Chen, Y.6
Liu, J.7
-
18
-
-
84861959172
-
Privacy preserving public auditing for secure cloud storage
-
Wang, C., Chow, S., Wang, Q., Ren, K., Lou, W., Privacy preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62:2 (2013), 362–375.
-
(2013)
IEEE Trans. Comput.
, vol.62
, Issue.2
, pp. 362-375
-
-
Wang, C.1
Chow, S.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
19
-
-
84963976001
-
Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud
-
Wang, H., He, D., Tang, S., Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Trans. Inf. Forensics Secur. 11:6 (2016), 1165–1176.
-
(2016)
IEEE Trans. Inf. Forensics Secur.
, vol.11
, Issue.6
, pp. 1165-1176
-
-
Wang, H.1
He, D.2
Tang, S.3
-
20
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
Wang, Q., Wang, C., Ren, K., Lou, W., Li, J., Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22:5 (2011), 847–859.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
21
-
-
84883057189
-
Public auditing for shared data with efficient user revocation in the cloud
-
Wang, B., Li, B., Li, H., 2013a. Public auditing for shared data with efficient user revocation in the cloud. In: Proceedings of the IEEE INFOCOM 2013. vol. 8, no. 1, pp. 2904–2912.
-
(2013)
Proceedings of the IEEE INFOCOM 2013
, vol.8
, Issue.1
, pp. 2904-2912
-
-
Wang, B.1
Li, B.2
Li, H.3
-
22
-
-
84891354182
-
Privacy-preserving public auditing for shared cloud data supporting group dynamics
-
June 9–13, 2013
-
Wang, B., Li, H., Li, M., 2013b. Privacy-preserving public auditing for shared cloud data supporting group dynamics. In: Proceedings of the 2013 IEEE International Conference on IEEE Communications (ICC). June 9–13, 2013, pp. 1946–1950.
-
(2013)
Proceedings of the 2013 IEEE International Conference on IEEE Communications (ICC)
, pp. 1946-1950
-
-
Wang, B.1
Li, H.2
Li, M.3
-
23
-
-
84866761388
-
Oruta: privacy-preserving public auditing for shared data in the cloud
-
In: June 24–29, 2012
-
Wang, B., Li, B., Li, H., 2012. Oruta: privacy-preserving public auditing for shared data in the cloud. In: Proceedings of the IEEE Cloud 2012. June 24–29, 2012, pp. 295–302.
-
(2012)
Proceedings of the IEEE Cloud 2012
, pp. 295-302
-
-
Wang, B.1
Li, B.2
Li, H.3
-
24
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
In: 2010
-
Wang, C., Wang, Q., Ren, K., Lou, W., 2010. Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of the IEEE INFOCOM 2010. pp. 525–533.
-
(2010)
Proceedings of the IEEE INFOCO
, pp. 525-533
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
25
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
In: 2009
-
Wang, Q., Wang, C., Li, J., Ren, K., Lou, W., 2009. Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings of the ESORICS 2009. pp. 355–370.
-
(2009)
Proceedings of the ESORIC
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
26
-
-
84902317194
-
Secure and efficient privacy-preserving public auditing scheme for cloud storage
-
Worku, S.G., Xu, C., Zhao, J., He, X., Secure and efficient privacy-preserving public auditing scheme for cloud storage. Comput. Electr. Eng. 40:5 (2014), 1703–1713.
-
(2014)
Comput. Electr. Eng.
, vol.40
, Issue.5
, pp. 1703-1713
-
-
Worku, S.G.1
Xu, C.2
Zhao, J.3
He, X.4
-
27
-
-
84962382590
-
Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability
-
Yang, G., Yu, J., Shen, W., Su, Q., Zhang, F., Hao, R., Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J. Syst. Softw. 113 (2016), 130–139.
-
(2016)
J. Syst. Softw.
, vol.113
, pp. 130-139
-
-
Yang, G.1
Yu, J.2
Shen, W.3
Su, Q.4
Zhang, F.5
Hao, R.6
-
28
-
-
84963837768
-
Enabling cloud storage auditing with verifiable outsourcing of key updates
-
Yu, J., Ren, K., Wang, C., Enabling cloud storage auditing with verifiable outsourcing of key updates. IEEE Trans. Inf. Forensics Secur. 11:5 (2016), 1362–1375.
-
(2016)
IEEE Trans. Inf. Forensics Secur.
, vol.11
, Issue.5
, pp. 1362-1375
-
-
Yu, J.1
Ren, K.2
Wang, C.3
-
29
-
-
84928139575
-
Enabling cloud storage auditing with key-exposure resistance
-
Yu, J., Ren, K., Wang, C., Varadharajan, V., Enabling cloud storage auditing with key-exposure resistance. IEEE Trans. Inf. Forensics Secur. 10:6 (2015), 1167–1179.
-
(2015)
IEEE Trans. Inf. Forensics Secur.
, vol.10
, Issue.6
, pp. 1167-1179
-
-
Yu, J.1
Ren, K.2
Wang, C.3
Varadharajan, V.4
-
30
-
-
84949654521
-
IRIBE: intrusion-resilient identity-based encryption
-
Yu, J., Hao, R., Zhao, H., Shu, M., Fan, J., IRIBE: intrusion-resilient identity-based encryption. Inf. Sci. 329 (2016), 90–104.
-
(2016)
Inf. Sci.
, vol.329
, pp. 90-104
-
-
Yu, J.1
Hao, R.2
Zhao, H.3
Shu, M.4
Fan, J.5
-
31
-
-
84904430603
-
Efficient public integrity checking for cloud data sharing with multi-user modification
-
In: April 27–May 2, 2014
-
Yuan, J., Yu, S., 2014. Efficient public integrity checking for cloud data sharing with multi-user modification. In: Proceedings of the IEEE INFOCOM 2014. April 27–May 2, 2014, pp. 2121–2129.
-
(2014)
Proceedings of the IEEE INFOCOM 2014
, pp. 2121-2129
-
-
Yuan, J.1
Yu, S.2
-
32
-
-
79959325063
-
Dynamic audit services for integrity verification of outsourced storage in clouds
-
In: 2011
-
Zhu, Y., Wang, H., Hu, Z., Ahn, G.-J., Hu, H., Yau, S.S., 2011. Dynamic audit services for integrity verification of outsourced storage in clouds. In: Proceedings of the ACM SAC 2011. pp. 1550–1557.
-
(2011)
Proceedings of the ACM SA
, pp. 1550-1557
-
-
Zhu, Y.1
Wang, H.2
Hu, Z.3
Ahn, G.-J.4
Hu, H.5
Yau, S.S.6
|