-
1
-
-
84940720283
-
New models for efficient authenticated dictionaries
-
Atighehchi, K., Bonnecaze, A., Risterucci, G., New models for efficient authenticated dictionaries. Comput. Secur. 53 (2015), 203–214.
-
(2015)
Comput. Secur.
, vol.53
, pp. 203-214
-
-
Atighehchi, K.1
Bonnecaze, A.2
Risterucci, G.3
-
2
-
-
80051977699
-
Verifiable delegation of computation over large datasets
-
Benabbas, S., Gennaro, R., Vahlis, Y., Verifiable delegation of computation over large datasets. Conference on Advances in Cryptology, 2011, 111–131.
-
(2011)
Conference on Advances in Cryptology
, pp. 111-131
-
-
Benabbas, S.1
Gennaro, R.2
Vahlis, Y.3
-
3
-
-
85032625319
-
Don't trust the cloud, verify: integrity and consistency for cloud object stores
-
Brandenburger, M., Cachin, C., Kneevic, N., Don't trust the cloud, verify: integrity and consistency for cloud object stores. ACM Trans. Priv. Secur. 20:3 (2017), 1–11.
-
(2017)
ACM Trans. Priv. Secur.
, vol.20
, Issue.3
, pp. 1-11
-
-
Brandenburger, M.1
Cachin, C.2
Kneevic, N.3
-
4
-
-
85014497815
-
Chameleon-hashes with ephemeral trapdoors and applications to invisible sanitizable signatures
-
Camenisch, J., Derler, D., Krenn, S., Pohls, H.C., Samelin, K., Slamanig, D., Chameleon-hashes with ephemeral trapdoors and applications to invisible sanitizable signatures. Conference on Practice and Theory of Public-key Cryptography 2017, 2017, 152–182.
-
(2017)
Conference on Practice and Theory of Public-key Cryptography 2017
, pp. 152-182
-
-
Camenisch, J.1
Derler, D.2
Krenn, S.3
Pohls, H.C.4
Samelin, K.5
Slamanig, D.6
-
6
-
-
84869379879
-
Publicly verifiable delegation of large polynomials and matrix computations, with applications
-
Fiore, D., Gennaro, R., Publicly verifiable delegation of large polynomials and matrix computations, with applications. ACM Conference on Computer and Communications Security, 2012, 501–512.
-
(2012)
ACM Conference on Computer and Communications Security
, pp. 501-512
-
-
Fiore, D.1
Gennaro, R.2
-
7
-
-
85042177781
-
Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network
-
Gao, C., Chen, Q., Li, X., Xia, S., Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network. Cluster Comput., 2018, 10.1007/s10586-017-1649-y.
-
(2018)
Cluster Comput.
-
-
Gao, C.1
Chen, Q.2
Li, X.3
Xia, S.4
-
8
-
-
79958255284
-
Efficient authenticated data structures for graph connectivity and geometric search problems
-
Goodrich, M.T., Tamassia, R., Triandopoulos, N., Efficient authenticated data structures for graph connectivity and geometric search problems. Algorithmica (New York) 60:3 (2011), 505–552.
-
(2011)
Algorithmica (New York)
, vol.60
, Issue.3
, pp. 505-552
-
-
Goodrich, M.T.1
Tamassia, R.2
Triandopoulos, N.3
-
9
-
-
85020050894
-
Insight of the protection for data security under selective opening attacks
-
Huang, Z.G., Liu, S.L., Mao, X.P., Chen, K.F., Li, J., Insight of the protection for data security under selective opening attacks. Inf. Sci. 412 (2017), 223–241.
-
(2017)
Inf. Sci.
, vol.412
, pp. 223-241
-
-
Huang, Z.G.1
Liu, S.L.2
Mao, X.P.3
Chen, K.F.4
Li, J.5
-
10
-
-
84973111531
-
A survey of security issues for cloud computing
-
Khan, M.A., A survey of security issues for cloud computing. J. Network Comput. Appl. 71 (2016), 11–29.
-
(2016)
J. Network Comput. Appl.
, vol.71
, pp. 11-29
-
-
Khan, M.A.1
-
11
-
-
84959329572
-
Efficient verifiable data streaming
-
Kim, K.S., Jeong, I.R., Efficient verifiable data streaming. Secur. Commun. Network. 8:18 (2016), 4013–4018.
-
(2016)
Secur. Commun. Network.
, vol.8
, Issue.18
, pp. 4013-4018
-
-
Kim, K.S.1
Jeong, I.R.2
-
12
-
-
84961142267
-
Nearly optimal verifiable data streaming
-
Krupp, J., Schroeder, D., Simkin, M., Fiore, D., Ateniese, G., Nuernberger, S., Nearly optimal verifiable data streaming. Public-key Cryptography -PKC 2016, PT I, 2016, 417–445.
-
(2016)
Public-key Cryptography -PKC 2016, PT I
, pp. 417-445
-
-
Krupp, J.1
Schroeder, D.2
Simkin, M.3
Fiore, D.4
Ateniese, G.5
Nuernberger, S.6
-
13
-
-
84901032811
-
Secure deduplication with efficient and reliable convergent key management
-
Li, J., Chen, X.F., Li, M.Q., Li, J.W., Lee, P.P.C., Lou, W.J., Secure deduplication with efficient and reliable convergent key management. IEEE Trans. Parallel Distrib. Syst. 25:6 (2014), 1615–1625.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.6
, pp. 1615-1625
-
-
Li, J.1
Chen, X.F.2
Li, M.Q.3
Li, J.W.4
Lee, P.P.C.5
Lou, W.J.6
-
14
-
-
85028920194
-
Secure attribute-based data sharing for resource-limited users in cloud computing
-
Li, J., Zhang, Y.H., Chen, X.F., Xiang, Y., Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72 (2018), 1–12.
-
(2018)
Comput. Secur.
, vol.72
, pp. 1-12
-
-
Li, J.1
Zhang, Y.H.2
Chen, X.F.3
Xiang, Y.4
-
15
-
-
85018906248
-
Multi-key privacy-preserving deep learning in cloud computing
-
Li, P., Li, J., Huang, Z.G., Li, T., Gao, C.Z., Yiu, S.M., Chen, K., Multi-key privacy-preserving deep learning in cloud computing. Future Generat. Comput. Syst. 74 (2017), 76–85.
-
(2017)
Future Generat. Comput. Syst.
, vol.74
, pp. 76-85
-
-
Li, P.1
Li, J.2
Huang, Z.G.3
Li, T.4
Gao, C.Z.5
Yiu, S.M.6
Chen, K.7
-
16
-
-
21044438930
-
A general model for authenticated data structures
-
Martel, C., Nuckolls, G., Devanbu, P., Gertz, M., Kwong, A., Stubblebine, S.G., A general model for authenticated data structures. Algorithmica 39:1 (2004), 21–41.
-
(2004)
Algorithmica
, vol.39
, Issue.1
, pp. 21-41
-
-
Martel, C.1
Nuckolls, G.2
Devanbu, P.3
Gertz, M.4
Kwong, A.5
Stubblebine, S.G.6
-
18
-
-
84893481888
-
Authenticated data structures, generically
-
Miller, A., Hicks, M., Katz, J., Shi, E., Authenticated data structures, generically. Conference Record of the Annual ACM Sigplan-Sigact Symposium on Principles of Programming Languages, 2014, 411–423.
-
(2014)
Conference Record of the Annual ACM Sigplan-Sigact Symposium on Principles of Programming Languages
, pp. 411-423
-
-
Miller, A.1
Hicks, M.2
Katz, J.3
Shi, E.4
-
19
-
-
0033733822
-
Certificate revocation and certificate update
-
Naor, M., Nissim, K., Certificate revocation and certificate update. IEEE J. Sel. Area. Commun. 18:4 (2000), 561–570.
-
(2000)
IEEE J. Sel. Area. Commun.
, vol.18
, Issue.4
, pp. 561-570
-
-
Naor, M.1
Nissim, K.2
-
20
-
-
84883361678
-
Streaming authenticated data structures
-
Papamanthou, C., Shi, E., Tamassia, R., Yi, K., Streaming authenticated data structures. Theory and Applications of Cryptographic Techniques, EUROCRYPT 2013, 2013, 353–370.
-
(2013)
Theory and Applications of Cryptographic Techniques, EUROCRYPT 2013
, pp. 353-370
-
-
Papamanthou, C.1
Shi, E.2
Tamassia, R.3
Yi, K.4
-
21
-
-
78650266531
-
Optimal authenticated data structures with multilinear forms
-
Papamanthou, C., Triandopoulos, N., Triandopoulos, N., Optimal authenticated data structures with multilinear forms. International Conference on Pairing-based Cryptography, 2010, 246–264.
-
(2010)
International Conference on Pairing-based Cryptography
, pp. 246-264
-
-
Papamanthou, C.1
Triandopoulos, N.2
Triandopoulos, N.3
-
22
-
-
84858307151
-
How to delegate and verify in public: verifiable computation from attribute-based encryption
-
Parno, B., Raykova, M., Vaikuntanathan, V., How to delegate and verify in public: verifiable computation from attribute-based encryption. International Conference on Theory of Cryptography, 2012, 422–439.
-
(2012)
International Conference on Theory of Cryptography
, pp. 422-439
-
-
Parno, B.1
Raykova, M.2
Vaikuntanathan, V.3
-
23
-
-
85006173593
-
Comments on “identity-based distributed provable data possession in multicloud storage”
-
Peng, S., Zhou, F.C., Xu, J., Xu, Z.F., Comments on “identity-based distributed provable data possession in multicloud storage”. IEEE Trans. Services Comput. 9:6 (2016), 996–998.
-
(2016)
IEEE Trans. Services Comput.
, vol.9
, Issue.6
, pp. 996-998
-
-
Peng, S.1
Zhou, F.C.2
Xu, J.3
Xu, Z.F.4
-
25
-
-
84949982856
-
Veristream - a framework for verifiable data streaming
-
Schoder, D., Simkin, M., Veristream - a framework for verifiable data streaming. Proceedings of FC 2015, 2015, 548–566.
-
(2015)
Proceedings of FC 2015
, pp. 548-566
-
-
Schoder, D.1
Simkin, M.2
-
27
-
-
84945431187
-
Dynamic remote data auditing for securing big data storage in cloud computing
-
Sookhak, M., Gani, A., Khan, M.K., Buyya, R., Dynamic remote data auditing for securing big data storage in cloud computing. Inf. Sci. 380 (2014), 101–116.
-
(2014)
Inf. Sci.
, vol.380
, pp. 101-116
-
-
Sookhak, M.1
Gani, A.2
Khan, M.K.3
Buyya, R.4
-
28
-
-
26444561838
-
Computational bounds on hierarchical data processing with applications to information security
-
Tamassia, R., Triandopoulos, N., Computational bounds on hierarchical data processing with applications to information security. International Conference on Automata, Languages and Programming, 2005, 153–165.
-
(2005)
International Conference on Automata, Languages and Programming
, pp. 153-165
-
-
Tamassia, R.1
Triandopoulos, N.2
-
29
-
-
84901766511
-
Outsourcing multi-version key-value stores with verifiable data freshness
-
Tang, Y.Z., Liu, L., Wang, T., Hu, X., Sailer, R., Pietzuch, P., Outsourcing multi-version key-value stores with verifiable data freshness. IEEE International Conference on Data Engineering, 2014, 1214–1217.
-
(2014)
IEEE International Conference on Data Engineering
, pp. 1214-1217
-
-
Tang, Y.Z.1
Liu, L.2
Wang, T.3
Hu, X.4
Sailer, R.5
Pietzuch, P.6
|