Secure and Efficient Dynamic Data Operations in Cloud Computing
暂无分享,去创建一个
[1] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[2] Mary Baker,et al. Privacy-Preserving Audit and Extraction of Digital Contents , 2008, IACR Cryptol. ePrint Arch..
[3] Cong Wang,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[4] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[5] Ethan L. Miller,et al. Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[6] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[7] Ari Juels,et al. Proofs of retrievability: theory and implementation , 2009, CCSW '09.
[8] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[9] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[10] Reza Curtmola,et al. MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[11] Miguel Castro,et al. Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.
[12] Yevgeniy Dodis,et al. Proofs of Retrievability via Hardness Amplification , 2009, IACR Cryptol. ePrint Arch..
[13] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[14] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[15] Michael Burrows,et al. A Cooperative Internet Backup Scheme , 2003, USENIX Annual Technical Conference, General Track.
[16] Mary Baker,et al. Auditing to Keep Online Storage Services Honest , 2007, HotOS.
[17] D. B. Davis,et al. Sun Microsystems Inc. , 1993 .