A Cloud Provider-Agnostic Secure Storage Protocol
暂无分享,去创建一个
[1] Bruce Schneier,et al. Performance Comparison of the AES Submissions , 1999 .
[2] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[3] Yongdae Kim,et al. On protecting integrity and confidentiality of cryptographic file system for outsourced storage , 2009, CCSW '09.
[4] Stanislaw Jarecki,et al. Cryptographic Primitives Enforcing Communication and Storage Complexity , 2002, Financial Cryptography.
[5] Bharat K. Bhargava,et al. Secure and efficient access to outsourced data , 2009, CCSW '09.
[6] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[7] Ari Juels,et al. Proofs of retrievability: theory and implementation , 2009, CCSW '09.
[8] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[9] Cong Wang,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[10] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[11] Ethan L. Miller,et al. POTSHARDS: Secure Long-Term Storage Without Encryption , 2007, USENIX Annual Technical Conference.
[12] Peng Ning,et al. Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings , 2009, ESORICS.
[13] Adi Shamir,et al. How to share a secret , 1979, CACM.
[14] Giuseppe Cattaneo,et al. Design and Implementation of a Transparent Cryptographic File System for Unix , 2007 .
[15] Matt Blaze,et al. A cryptographic file system for UNIX , 1993, CCS '93.
[16] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.