Identity-based remote data possession checking in public clouds
暂无分享,去创建一个
Josep Domingo-Ferrer | Huaqun Wang | Qianhong Wu | Bo Qin | J. Domingo-Ferrer | Huaqun Wang | Qianhong Wu | Bo Qin
[1] Gail-Joon Ahn,et al. Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage , 2012, IEEE Transactions on Parallel and Distributed Systems.
[2] M. Mrinalni Vaknishadh,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2012 .
[3] M. Anwar Hasan,et al. On Verifying Dynamic Multiple Data Copies over Cloud Servers , 2011, IACR Cryptol. ePrint Arch..
[4] Huaqun Wang,et al. Proxy Provable Data Possession in Public Clouds , 2013, IEEE Transactions on Services Computing.
[5] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[6] Paulo S. L. M. Barreto,et al. Efficient Implementation of Pairing-Based Cryptosystems , 2004, Journal of Cryptology.
[7] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[8] Gail-Joon Ahn,et al. Zero-knowledge proofs of retrievability , 2011, Science China Information Sciences.
[9] Hoon Wei Lim,et al. On the application of identity-based cryptography in grid security , 2006 .
[10] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[11] Ngoc Tram Anh Nguyen. Fair and dynamic proofs of retrievability , 2014 .
[12] Nenghai Yu,et al. A Multiple-Replica Remote Data Possession Checking Protocol with Public Verifiability , 2010, 2010 Second International Symposium on Data, Privacy, and E-Commerce.
[13] Reza Curtmola,et al. MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[14] Yevgeniy Dodis,et al. Proofs of Retrievability via Hardness Amplification , 2009, IACR Cryptol. ePrint Arch..
[15] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[16] Stephen S. Yau,et al. Efficient provable data possession for hybrid clouds , 2010, CCS '10.
[17] Wenjing Lou,et al. FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks , 2011 .
[18] Huaqun Wang,et al. On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage , 2014, IEEE Transactions on Parallel and Distributed Systems.
[19] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[20] Ayad F. Barsoum,et al. Provable Possession and Replication of Data over Cloud Servers , 2011 .
[21] A. Miyaji,et al. New Explicit Conditions of Elliptic Curve Traces for FR-Reduction , 2001 .
[22] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[23] Ari Juels,et al. Proofs of retrievability: theory and implementation , 2009, CCSW '09.
[24] Jacques Stern,et al. Security Arguments for Digital Signatures and Blind Signatures , 2015, Journal of Cryptology.
[25] Wenjing Lou,et al. Attribute-based on-demand multicast group setup with membership anonymity , 2008, SecureComm.
[26] Josep Domingo-Ferrer,et al. Efficient Remote Data Possession Checking in Critical Information Infrastructures , 2008, IEEE Transactions on Knowledge and Data Engineering.