-
3
-
-
85029378109
-
-
A European Report on Servers & Storage for Small Business, Feb.
-
Dell and Intel, "Manage your changing IT needs," A European Report on Servers & Storage for Small Business, Feb. 2012.
-
(2012)
Manage Your Changing IT Needs
-
-
-
4
-
-
84871583519
-
-
Findings of Microsoft SMB Business in the Cloud 2012 research report conducted in conjunction with Edge Strategies Inc., Feb.
-
Microsoft, "Drivers & inhibitors to cloud adoption for small and midsize businesses," Findings of Microsoft SMB Business in the Cloud 2012 research report conducted in conjunction with Edge Strategies Inc., Feb. 2012.
-
(2012)
Drivers & Inhibitors to Cloud Adoption for Small and Midsize Businesses
-
-
-
5
-
-
74049154660
-
Secure and efficient access to outsourced data
-
Chicago, IL, USA, Nov. 13
-
W. Wang, Z. Li, R. Owens, and B. K. Bhargava, "Secure and efficient access to outsourced data," in Proc. 1st ACM Cloud Comput. Security Workshop, Chicago, IL, USA, Nov. 13, 2009, pp. 55-66.
-
(2009)
Proc. 1st ACM Cloud Comput. Security Workshop
, pp. 55-66
-
-
Wang, W.1
Li, Z.2
Owens, R.3
Bhargava, B.K.4
-
7
-
-
58349083629
-
-
Cryptology ePrint Archive, Rep. 2008/186
-
M. A. Shah, R. Swaminathan, and M. Baker, "Privacy-preserving audit and extraction of digital contents," Cryptology ePrint Archive, Rep. 2008/186, 2008, available from http://eprint.iacr.org/.
-
(2008)
Privacy-preserving Audit and Extraction of Digital Contents
-
-
Shah, M.A.1
Swaminathan, R.2
Baker, M.3
-
9
-
-
59449105324
-
An analysis of data corruption in the storage stack
-
L. N. Bairavasundaram, A. C. Arpaci-Dusseau, R. H. Arpaci-Dusseau, G. R. Goodson, and B. Schroeder, "An analysis of data corruption in the storage stack," ACM Trans. Storage, vol. 4, no. 3, pp. 8:1-8:28, 2008.
-
(2008)
ACM Trans. Storage
, vol.4
, Issue.3
, pp. 1-28
-
-
Bairavasundaram, L.N.1
Arpaci-Dusseau, A.C.2
Arpaci-Dusseau, R.H.3
Goodson, G.R.4
Schroeder, B.5
-
10
-
-
84947200665
-
Failure trends in a large disk drive population
-
San Jose, CA, USA, Feb. 13-16
-
E. Pinheiro, W. Weber, and L. A. Barroso, "Failure trends in a large disk drive population," in Proc. 5th USENIX Conf. File Storage Technol., San Jose, CA, USA, Feb. 13-16, 2007, pp. 17-28.
-
(2007)
Proc. 5th USENIX Conf. File Storage Technol.
, pp. 17-28
-
-
Pinheiro, E.1
Weber, W.2
Barroso, L.A.3
-
11
-
-
85084160707
-
Disk failures in the real world: What does an MTTF of 1,000,000 hours mean to you?
-
Feb. 13-16, San Jose, CA, USA
-
B. Schroeder and G. A. Gibson, "Disk failures in the real world: What does an MTTF of 1,000,000 hours mean to you?" in Proc. 5th USENIX Conf. File Storage Technol., Feb. 13-16, San Jose, CA, USA, 2007, pp. 1-16.
-
(2007)
Proc. 5th USENIX Conf. File Storage Technol.
, pp. 1-16
-
-
Schroeder, B.1
Gibson, G.A.2
-
12
-
-
33747176236
-
Authentication and integrity in outsourced databases
-
E. Mykletun, M. Narasimha, and G. Tsudik, "Authentication and integrity in outsourced databases," ACM Trans. Storage, vol. 2, no. 2, pp. 107-138, 2006.
-
(2006)
ACM Trans. Storage
, vol.2
, Issue.2
, pp. 107-138
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
13
-
-
84869744058
-
Efficient query integrity for outsourced dynamic databases
-
Raleigh, NC, USA, Oct. 19
-
Q. Zheng, S. Xu, and G. Ateniese, "Efficient query integrity for outsourced dynamic databases," in Proc. ACM Workshop Cloud Comput. Security, Raleigh, NC, USA, Oct. 19, 2012, pp. 71-82.
-
(2012)
Proc. ACM Workshop Cloud Comput. Security
, pp. 71-82
-
-
Zheng, Q.1
Xu, S.2
Ateniese, G.3
-
14
-
-
84951787728
-
-
Intel, White paper
-
A. Mendoza, "Cold storage in the cloud: Trends, challenges, and solutions," Intel, White paper, 2013.
-
(2013)
Cold Storage in the Cloud: Trends, Challenges, and Solutions
-
-
Mendoza, A.1
-
16
-
-
84881080693
-
An efficient and secure dynamic auditing protocol for data storage in cloud computing
-
Sep.
-
K. Yang and X. Jia, "An efficient and secure dynamic auditing protocol for data storage in cloud computing," IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 9, pp. 1717-1726, Sep. 2013.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.9
, pp. 1717-1726
-
-
Yang, K.1
Jia, X.2
-
17
-
-
84904430603
-
Efficient public integrity checking for cloud data sharing with multi-user modification
-
Toronto, ON, Canada, Apr. 27-May 2
-
J. Yuan and S. Yu, "Efficient public integrity checking for cloud data sharing with Multi-user modification," in Proc. IEEE Conf. Comput. Commun., Toronto, ON, Canada, Apr. 27-May 2, 2014, pp. 2121-2129.
-
(2014)
Proc. IEEE Conf. Comput. Commun.
, pp. 2121-2129
-
-
Yuan, J.1
Yu, S.2
-
18
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
San Diego, CA, USA, Mar. 15-19
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for data storage security in cloud computing," in Proc. IEEE 29th Int. Conf. Comput. Commun., Joint Conf. IEEE Comput. Commun. Soc., San Diego, CA, USA, Mar. 15-19, 2010, pp. 525-533.
-
(2010)
Proc. IEEE 29th Int. Conf. Comput. Commun., Joint Conf. IEEE Comput. Commun. Soc.
, pp. 525-533
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
19
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
May
-
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling public auditability and data dynamics for storage security in cloud computing," IEEE Trans. Parallel Distrib. Syst. vol. 22, no. 5, pp. 847-859, May 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
20
-
-
84861959172
-
Privacypreserving public auditing for secure cloud storage
-
Feb.
-
C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, "Privacypreserving public auditing for secure cloud storage," IEEE Trans. Comput., vol. 62, no. 2, pp. 362-375, Feb. 2013.
-
(2013)
IEEE Trans. Comput.
, vol.62
, Issue.2
, pp. 362-375
-
-
Wang, C.1
Chow, S.S.M.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
21
-
-
84863472230
-
Knox: Privacy-preserving auditing for shared data with large groups in the cloud
-
Singapore, Jun. 26-29
-
B. Wang, B. Li, and H. Li, "Knox: Privacy-preserving auditing for shared data with large groups in the cloud," in Proc. 10th Int. Conf. Appl. Cryptography Netw. Security, Singapore, Jun. 26-29, 2012, pp. 507-525.
-
(2012)
Proc. 10th Int. Conf. Appl. Cryptography Netw. Security
, pp. 507-525
-
-
Wang, B.1
Li, B.2
Li, H.3
-
22
-
-
84942034654
-
Efficient public verification on the integrity of multi-owner data in the cloud
-
B. Wang, H. Li, X. Liu, F. Li, and X. Li, "Efficient public verification on the integrity of multi-owner data in the cloud," J. Commun. Netw., vol. 16, no. 6, pp. 592-599, 2014.
-
(2014)
J. Commun. Netw.
, vol.16
, Issue.6
, pp. 592-599
-
-
Wang, B.1
Li, H.2
Liu, X.3
Li, F.4
Li, X.5
-
23
-
-
84922271700
-
Oruta: Privacy-preserving public auditing for shared data in the cloud
-
Jan.-Mar.
-
B. Wang, B. Li, and H. Li, "Oruta: Privacy-preserving public auditing for shared data in the cloud," IEEE Trans. Cloud Comput., vol. 2, no. 1, pp. 43-56, Jan.-Mar. 2014.
-
(2014)
IEEE Trans. Cloud Comput.
, vol.2
, Issue.1
, pp. 43-56
-
-
Wang, B.1
Li, B.2
Li, H.3
-
24
-
-
84922828826
-
Panda: Public auditing for shared data with efficient user revocation in the cloud
-
Jan./Feb.
-
B. Wang, B. Li, and H. Li, "Panda: Public auditing for shared data with efficient user revocation in the cloud," IEEE Trans. Services Comput., vol. 8, no. 1, pp. 92-106, Jan./Feb. 2015.
-
(2015)
IEEE Trans. Services Comput.
, vol.8
, Issue.1
, pp. 92-106
-
-
Wang, B.1
Li, B.2
Li, H.3
-
25
-
-
33745528450
-
Authentication of outsourced databases using signature aggregation and chaining
-
Singapore, Apr. 12-15
-
M. Narasimha and G. Tsudik, "Authentication of outsourced databases using signature aggregation and chaining," in Proc. 11th Int. Conf. Database Syst. Adv. Appl., Singapore, Apr. 12-15, 2006, pp. 420-436.
-
(2006)
Proc. 11th Int. Conf. Database Syst. Adv. Appl.
, pp. 420-436
-
-
Narasimha, M.1
Tsudik, G.2
-
26
-
-
77952757644
-
Scalable verification for outsourced dynamic databases
-
H. Pang, J. Zhang, and K. Mouratidis, "Scalable verification for outsourced dynamic databases," Proc. VLDB Endowment, vol. 2, no. 1, pp. 802-813, 2009.
-
(2009)
Proc. VLDB Endowment
, vol.2
, Issue.1
, pp. 802-813
-
-
Pang, H.1
Zhang, J.2
Mouratidis, K.3
-
27
-
-
84921446185
-
Multi-trapdoor hash functions and their applications in network security
-
San Francisco, CA, USA, Oct. 29-31
-
S. Chandrasekhar and M. Singhal, "Multi-trapdoor hash functions and their applications in network security," in Proc. IEEE 2nd Conf. Commun. Netw. Security, San Francisco, CA, USA, Oct. 29-31, 2014, pp. 472-480.
-
(2014)
Proc. IEEE 2nd Conf. Commun. Netw. Security
, pp. 472-480
-
-
Chandrasekhar, S.1
Singhal, M.2
-
29
-
-
49849102704
-
Efficient generic on-line/off-line (threshold) signatures without key exposure
-
X. Chen, F. Zhang, H. Tian, B. Wei, W. Susilo, Y. Mu, H. Lee, and K. Kim, "Efficient generic on-line/off-line (threshold) signatures without key exposure," Inf. Sci., vol. 178, no. 21, pp. 4192-4203, 2008.
-
(2008)
Inf. Sci.
, vol.178
, Issue.21
, pp. 4192-4203
-
-
Chen, X.1
Zhang, F.2
Tian, H.3
Wei, B.4
Susilo, W.5
Mu, Y.6
Lee, H.7
Kim, K.8
-
30
-
-
74049121230
-
Dynamic provable data possession
-
Chicago, IL, USA, Nov. 9-13
-
C. C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, "Dynamic provable data possession," in Proc. 16th ACM Conf. Comput. Commun. Security, Chicago, IL, USA, Nov. 9-13, 2009, pp. 213-222.
-
(2009)
Proc. 16th ACM Conf. Comput. Commun. Security
, pp. 213-222
-
-
Erway, C.C.1
Küpçü, A.2
Papamanthou, C.3
Tamassia, R.4
-
31
-
-
68149102542
-
Efficient integrity checking of untrusted network storage
-
Alexandria, VA, USA, Oct. 27-31
-
A. Heitzmann, B. Palazzi, C. Papamanthou, and R. Tamassia, "Efficient integrity checking of untrusted network storage," in Proc. 4th ACM Workshop Storage Security Survivability, Alexandria, VA, USA, Oct. 27-31, 2008, pp. 43-54.
-
(2008)
Proc. 4th ACM Workshop Storage Security Survivability
, pp. 43-54
-
-
Heitzmann, A.1
Palazzi, B.2
Papamanthou, C.3
Tamassia, R.4
-
32
-
-
72349083152
-
Skip list based authenticated data structure in das paradigm
-
Lanzhou, Gansu, China, Aug. 27-29
-
J. Wang and X. Du, "Skip list based authenticated data structure in DAS paradigm," in Proc. 8th Int. Conf. Grid Cooperative Comput., Lanzhou, Gansu, China, Aug. 27-29, 2009, pp. 69-75.
-
(2009)
Proc. 8th Int. Conf. Grid Cooperative Comput.
, pp. 69-75
-
-
Wang, J.1
Du, X.2
-
33
-
-
79959823910
-
Remote data checking using provable data possession
-
G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. N. J. Peterson, and D. Song, "Remote data checking using provable data possession," ACM Trans. Inf. Syst. Security, vol. 14, no. 1, p. 12, 2011.
-
(2011)
ACM Trans. Inf. Syst. Security
, vol.14
, Issue.1
, pp. 12
-
-
Ateniese, G.1
Burns, R.C.2
Curtmola, R.3
Herring, J.4
Khan, O.5
Kissner, L.6
Peterson, Z.N.J.7
Song, D.8
-
34
-
-
84890471117
-
Proxy provable data possession in public clouds
-
Oct.-Dec.
-
H. Wang, "Proxy provable data possession in public clouds," IEEE Trans. Services Comput., vol. 6, no. 4, pp. 551-559, Oct.-Dec. 2013.
-
(2013)
IEEE Trans. Services Comput.
, vol.6
, Issue.4
, pp. 551-559
-
-
Wang, H.1
-
35
-
-
74049103479
-
Pors: Proofs of retrievability for large files
-
B. S. K. Jr, Alexandria, VA, USA, Oct. 28-31
-
A. Juels and B. S. K. Jr, "Pors: Proofs of retrievability for large files," in Proc. 14th ACM Conf. Comput. Commun. Security, Alexandria, VA, USA, Oct. 28-31, 2007, pp. 584-597.
-
(2007)
Proc. 14th ACM Conf. Comput. Commun. Security
, pp. 584-597
-
-
Juels, A.1
-
36
-
-
58349118819
-
Compact proofs of retrievability
-
Melbourne, Vic., Australia, Dec. 7-11
-
H. Shacham and B. Waters, "Compact proofs of retrievability," in Proc. 14th Int. Conf. Theory Appl. Cryptol. Inf. Security: Adv. Cryptol., Melbourne, Vic., Australia, Dec. 7-11, 2008, pp. 90-107.
-
(2008)
Proc. 14th Int. Conf. Theory Appl. Cryptol. Inf. Security: Adv. Cryptol.
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
37
-
-
84902475228
-
Remote integrity checking - how to trust files stored on untrusted servers
-
Lausanne, Switzerland, Nov. 13-14
-
Y. Deswarte, J. Quisquater, and A. Saïdane, "Remote integrity Checking - how to trust files stored on untrusted servers," in Proc. IFIP TC11/WG11.5, Integrity Internal Control Inf. Syst. VI, 6th Working Conf. Integrity Internal Control Inf. Syst., Lausanne, Switzerland, Nov. 13-14, 2003, pp. 1-11.
-
(2003)
Proc. IFIP TC11/WG11.5, Integrity Internal Control Inf. Syst. VI, 6th Working Conf. Integrity Internal Control Inf. Syst.
, pp. 1-11
-
-
Deswarte, Y.1
Quisquater, J.2
Saïdane, A.3
-
38
-
-
47849089563
-
Demonstrating data possession and uncheatable data transfer
-
D. L. G. Filho and P. S. L. M. Barreto, "Demonstrating data possession and uncheatable data transfer," IACR Cryptol. ePrint Archive, vol. 2006, p. 150, 2006.
-
(2006)
IACR Cryptol. EPrint Archive
, vol.2006
, pp. 150
-
-
Filho, D.L.G.1
Barreto, P.S.L.M.2
-
39
-
-
0038274733
-
Authentic data publication over the internet
-
P. T. Devanbu, M. Gertz, C. U. Martel, and S. G. Stubblebine, "Authentic data publication over the internet," J. Comput. Security, vol. 11, no. 3, pp. 291-314, 2003.
-
(2003)
J. Comput. Security
, vol.11
, Issue.3
, pp. 291-314
-
-
Devanbu, P.T.1
Gertz, M.2
Martel, C.U.3
Stubblebine, S.G.4
-
40
-
-
34250630995
-
Dynamic authenticated index structures for outsourced databases
-
Chicago, IL, USA, Jun. 27-29
-
F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin, "Dynamic authenticated index structures for outsourced databases," in Proc. ACM SIGMOD Int. Conf. Manage. Data, Chicago, IL, USA, Jun. 27-29, 2006, pp. 121-132.
-
(2006)
Proc. ACM SIGMOD Int. Conf. Manage. Data
, pp. 121-132
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
41
-
-
33244454312
-
Securing distributed storage: Challenges, techniques, and systems
-
Fairfax, VA, USA, Nov. 11
-
V. Kher and Y. Kim, "Securing distributed storage: Challenges, techniques, and systems," in Proc. 1st Int. Workshop Storage Security Survivability, Fairfax, VA, USA, Nov. 11, 2005, pp. 9-25.
-
(2005)
Proc. 1st Int. Workshop Storage Security Survivability
, pp. 9-25
-
-
Kher, V.1
Kim, Y.2
-
42
-
-
78651408225
-
Authenticated index structures for aggregation queries
-
F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin, "Authenticated index structures for aggregation queries," ACM Trans. Inf. Syst. Security, vol. 13, no. 4, p. 32, 2010.
-
(2010)
ACM Trans. Inf. Syst. Security
, vol.13
, Issue.4
, pp. 32
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
43
-
-
84945126272
-
Auditing for data integrity and reliability in cloud storage
-
New York, NY, USA: Springer
-
B. Liu and Y. Chen, "Auditing for data integrity and reliability in cloud storage," in Handbook on Data Centers. New York, NY, USA: Springer, 2015, pp. 535-559.
-
(2015)
Handbook on Data Centers
, pp. 535-559
-
-
Liu, B.1
Chen, Y.2
-
44
-
-
84888986259
-
Practical dynamic proofs of retrievability
-
Berlin, Germany, Nov. 4-8
-
E. Shi, E. Stefanov, and C. Papamanthou, "Practical dynamic proofs of retrievability," in Proc. 20th ACM SIGSAC Conf. Comput. Commun. Security, Berlin, Germany, Nov. 4-8, 2013, pp. 325-336.
-
(2013)
Proc. 20th ACM SIGSAC Conf. Comput. Commun. Security
, pp. 325-336
-
-
Shi, E.1
Stefanov, E.2
Papamanthou, C.3
-
45
-
-
84901607854
-
A review on remote data auditing in single cloud server: Taxonomy and open issues
-
M. Sookhak, H. Talebian, E. Ahmed, A. Gani, and M. K. Khan, "A review on remote data auditing in single cloud server: Taxonomy and open issues," J. Netw. Comput. Appl., vol. 43, pp. 121-141, 2014.
-
(2014)
J. Netw. Comput. Appl.
, vol.43
, pp. 121-141
-
-
Sookhak, M.1
Talebian, H.2
Ahmed, E.3
Gani, A.4
Khan, M.K.5
-
46
-
-
74049136395
-
Proofs of retrievability: Theory and implementation
-
Chicago, IL, USA, Nov. 13
-
K. D. Bowers, A. Juels, and A. Oprea, "Proofs of retrievability: Theory and implementation," in Proc. 1st ACM Cloud Comput. Security Workshop, Chicago, IL, USA, Nov. 13, 2009, pp. 43-54.
-
(2009)
Proc. 1st ACM Cloud Comput. Security Workshop
, pp. 43-54
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
47
-
-
84878830854
-
Dynamic audit services for outsourced storages in clouds
-
Apr.-Jun.
-
Y. Zhu, G. Ahn, H. Hu, S. S. Yau, H. G. An, and C. Hu, "Dynamic audit services for outsourced storages in clouds," IEEE Trans. Services Comput., vol. 6, no. 2, pp. 227-238, Apr.-Jun. 2013.
-
(2013)
IEEE Trans. Services Comput.
, vol.6
, Issue.2
, pp. 227-238
-
-
Zhu, Y.1
Ahn, G.2
Hu, H.3
Yau, S.S.4
An, H.G.5
Hu, C.6
-
48
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham, "Aggregate and verifiably encrypted signatures from bilinear maps," in Proc. Int. Conf. Theory Appl. Cryptographic Techn., 2003, pp. 416-432.
-
(2003)
Proc. Int. Conf. Theory Appl. Cryptographic Techn.
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
51
-
-
12344258539
-
Efficient signature generation by smart cards
-
C.-P. Schnorr, "Efficient signature generation by smart cards," J. Cryptol., vol. 4, no. 3, pp. 161-174, 1991.
-
(1991)
J. Cryptol.
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.-P.1
-
52
-
-
0028762624
-
New digital signature scheme based on discrete logarithm
-
Mar.
-
L. Harn, "New digital signature scheme based on discrete logarithm," Electron. Lett., vol. 30, no. 5, pp. 396-398, Mar. 1994.
-
(1994)
Electron. Lett.
, vol.30
, Issue.5
, pp. 396-398
-
-
Harn, L.1
-
53
-
-
0010224928
-
Meta-multisignature schemes based on the discrete logarithm problem
-
P. Horster, M. Michels, and H. Petersen, "Meta-multisignature schemes based on the discrete logarithm problem," in Proc. 11th Int. Conf. Inf. Security, 1995, pp. 128-141.
-
(1995)
Proc. 11th Int. Conf. Inf. Security
, pp. 128-141
-
-
Horster, P.1
Michels, M.2
Petersen, H.3
-
54
-
-
0035747565
-
Accountable-subgroup multisignatures: Extended abstract
-
S. Micali, K. Ohta, and L. Reyzin, "Accountable-subgroup multisignatures: Extended abstract," in Proc. 8th ACM Conf. Comput. Commun. Security, 2001, pp. 245-254.
-
(2001)
Proc. 8th ACM Conf. Comput. Commun. Security
, pp. 245-254
-
-
Micali, S.1
Ohta, K.2
Reyzin, L.3
-
55
-
-
84927727752
-
Security proofs for signature schemes
-
Saragossa, Spain, May 12-16
-
D. Pointcheval and J. Stern, "Security proofs for signature schemes," in Proc. 15th Annu. Int. Conf. Theory Appl. Cryptographic Techn., Saragossa, Spain, May 12-16, 1996, pp. 387-398.
-
(1996)
Proc. 15th Annu. Int. Conf. Theory Appl. Cryptographic Techn.
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
|