Using algebraic signatures to check data possession in cloud storage
暂无分享,去创建一个
[1] Paulo S. L. M. Barreto,et al. Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..
[2] Zheng Weimin,et al. A Practical Data Possession Checking Scheme for Networked Archival Storage , 2009 .
[3] Yevgeniy Dodis,et al. Proofs of Retrievability via Hardness Amplification , 2009, IACR Cryptol. ePrint Arch..
[4] Reza Curtmola,et al. MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[5] A. Broder. Some applications of Rabin’s fingerprinting method , 1993 .
[6] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[7] Thomas J. E. Schwarz. Verification of Parity Data in Large Scale Storage Systems , 2004, PDPTA.
[8] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[9] D. Boneh,et al. Short Signatures from the Weil Pairing , 2001, Journal of Cryptology.
[10] Reza Curtmola,et al. Robust remote data checking , 2008, StorageSS '08.
[11] F. MacWilliams,et al. The Theory of Error-Correcting Codes , 1977 .
[12] Josep Domingo-Ferrer,et al. Efficient Remote Data Possession Checking in Critical Information Infrastructures , 2008, IEEE Transactions on Knowledge and Data Engineering.
[13] Cong Wang,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[14] Lan-xiang Chen. A Homomorphic Hashing Based Provable Data Possession: A Homomorphic Hashing Based Provable Data Possession , 2011 .
[15] Jonathan Katz,et al. Proofs of Storage from Homomorphic Identification Protocols , 2009, ASIACRYPT.
[16] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[17] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, ASIACRYPT.
[18] Ethan L. Miller,et al. Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[19] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[20] Richard M. Karp,et al. Efficient Randomized Pattern-Matching Algorithms , 1987, IBM J. Res. Dev..
[21] Ari Juels,et al. Proofs of retrievability: theory and implementation , 2009, CCSW '09.
[22] Jean-Jacques Quisquater,et al. Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers , 2003, IICIS.
[23] Witold Litwin,et al. Algebraic signatures for scalable distributed data structures , 2004, Proceedings. 20th International Conference on Data Engineering.
[24] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[25] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[26] Gongde Guo,et al. An Efficient Remote Data Possession Checking in Cloud Storage , 2011 .