Storage Enforcement with Kolmogorov Complexity and List Decoding
暂无分享,去创建一个
Atri Rudra | Mohammad Iftekhar Husain | Steven Y. Ko | Steve Uurtamo | A. Rudra | S. Uurtamo | M. Husain
[1] Ethan L. Miller,et al. Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[2] Reza Curtmola,et al. MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[3] Yevgeniy Dodis,et al. Proofs of Retrievability via Hardness Amplification , 2009, IACR Cryptol. ePrint Arch..
[4] Richard M. Karp,et al. Efficient Randomized Pattern-Matching Algorithms , 1987, IBM J. Res. Dev..
[5] Sawan Kumar,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[6] Venkatesan Guruswami,et al. On the List-Decodability of Random Linear Codes , 2010, IEEE Transactions on Information Theory.
[7] A. Rudra,et al. List decoding and property testing of error-correcting codes , 2007 .
[8] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[9] Mary Baker,et al. Privacy-Preserving Audit and Extraction of Digital Contents , 2008, IACR Cryptol. ePrint Arch..
[10] J. Barkley Rosser,et al. Sharper Bounds for the Chebyshev Functions θ(x) and ψ(x). II , 1975 .
[11] Stanislaw Jarecki,et al. Cryptographic Primitives Enforcing Communication and Storage Complexity , 2002, Financial Cryptography.
[12] Graham Cormode,et al. Verifying Computations with Streaming Interactive Proofs , 2011, Proc. VLDB Endow..
[13] Michael K. Reiter,et al. Efficient Byzantine-tolerant erasure-coded storage , 2004, International Conference on Dependable Systems and Networks, 2004.
[14] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[15] Jeffrey Shallit,et al. Algorithmic Number Theory , 1996, Lecture Notes in Computer Science.
[16] Venkatesan Guruswami,et al. List decoding of error correcting codes , 2001 .
[17] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[18] Paulo S. L. M. Barreto,et al. Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..
[19] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[20] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[21] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[22] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[23] Ari Juels,et al. Proofs of retrievability: theory and implementation , 2009, CCSW '09.
[24] Gene Tsudik,et al. Secure Code Update for Embedded Devices via Proofs of Secure Erasure , 2010, ESORICS.