CS 2 : A Searchable Cryptographic Cloud Storage System
暂无分享,去创建一个
Charalampos Papamanthou | Seny Kamara | Charalampos Papamanthou | S. Kamara | T. Roeder | Tom Roeder
[1] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[2] Udi Manber,et al. Integrating content-based access mechanisms with hierarchical file systems , 1999, OSDI '99.
[3] Charalampos Papamanthou,et al. CS2: A Searchable Cryptographic Cloud Storage System , 2011 .
[4] Kevin Fu,et al. Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage , 2006, NDSS.
[5] Jonathan Katz,et al. Proofs of Storage from Homomorphic Identification Protocols , 2009, ASIACRYPT.
[6] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[7] Michael T. Goodrich,et al. Athos: Efficient Authentication of Outsourced File Systems , 2008, ISC.
[8] Roberto Tamassia,et al. Authenticated hash tables , 2008, CCS.
[9] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[10] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[11] Michael Gertz,et al. A General Model for Authenticated Data Structures , 2004, Algorithmica.
[12] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[13] Wolfgang Hörmann,et al. Rejection-inversion to generate variates from monotone discrete distributions , 1996, TOMC.
[14] Yevgeniy Dodis,et al. Proofs of Retrievability via Hardness Amplification , 2009, IACR Cryptol. ePrint Arch..
[15] Andrew W. Leung,et al. Copernicus: A Scalable, High-Performance Semantic File System , 2009 .
[16] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[17] Moni Naor,et al. Certificate revocation and certificate update , 1998, IEEE Journal on Selected Areas in Communications.
[18] Pierre Jouvelot,et al. Semantic file systems , 1991, SOSP '91.
[19] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[20] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[21] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[22] Elaine Shi,et al. Multi-Dimensional Range Query over Encrypted Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[23] Margo I. Seltzer,et al. Hierarchical File Systems Are Dead , 2009, HotOS.
[24] Brent Waters,et al. Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) , 2006, CRYPTO.
[25] Brent Waters,et al. Building an Encrypted and Searchable Audit Log , 2004, NDSS.
[26] Mihir Bellare,et al. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2005, Journal of Cryptology.
[27] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[28] Rafail Ostrovsky,et al. Public Key Encryption That Allows PIR Queries , 2007, CRYPTO.
[29] Idit Keidar,et al. Venus: verification for untrusted cloud storage , 2010, CCSW '10.
[30] Yongdae Kim,et al. Securing distributed storage: challenges, techniques, and systems , 2005, StorageSS '05.
[31] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[32] Dennis Shasha,et al. Building secure file systems out of byzantine storage , 2002, PODC '02.
[33] Moni Naor,et al. The complexity of online memory checking , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).
[34] Roberto Tamassia,et al. Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures , 2007, ICICS.
[35] Melissa Chase,et al. Structured Encryption and Controlled Disclosure , 2010, IACR Cryptol. ePrint Arch..
[36] Helen J. Wang,et al. Enabling Security in Cloud Storage SLAs with CloudProof , 2011, USENIX ATC.
[37] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[38] Qian Wang,et al. Plutus: Scalable Secure File Sharing on Untrusted Storage , 2003, FAST.
[39] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[40] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[41] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[42] Mihir Bellare,et al. A New Paradigm for Collision-Free Hashing: Incrementality at Reduced Cost , 1997, EUROCRYPT.
[43] Hovav Shacham,et al. SiRiUS: Securing Remote Untrusted Storage , 2003, NDSS.