Remote Data Integrity Checking Protocols from homomorphic hash functions
暂无分享,去创建一个
Dan Feng | Jingning Liu | Wei Xu | D. Feng | Jingning Liu | Wei Xu
[1] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[2] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[3] Reza Curtmola,et al. Remote data checking using provable data possession , 2011, TSEC.
[4] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[5] Yevgeniy Dodis,et al. Proofs of Retrievability via Hardness Amplification , 2009, IACR Cryptol. ePrint Arch..
[6] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, ASIACRYPT.
[7] Cong Wang,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[8] Nenghai Yu,et al. A Multiple-Replica Remote Data Possession Checking Protocol with Public Verifiability , 2010, 2010 Second International Symposium on Data, Privacy, and E-Commerce.
[9] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[10] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[11] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[12] Roberto Tamassia,et al. Authenticated Data Structures , 2003, ESA.
[13] Reza Curtmola,et al. MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[14] Jonathan Katz,et al. Secure Network Coding Over the Integers , 2010, IACR Cryptol. ePrint Arch..