Client-Side Encryption in Cloud Storage Using Lagrange Interpolation and Pairing Based Cryptography
暂无分享,去创建一个
[1] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[2] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[3] Moni Naor,et al. The Complexity of Online Memory Checking , 2005, FOCS.
[4] P. S. Avadhani,et al. Secure Message Transmission using Lagrange Polynomial Interpolation and Huffman Coding , 2012 .
[5] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[6] Lei Zhang,et al. Efficient many-to-one authentication with certificateless aggregate signatures , 2010, Comput. Networks.
[7] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[8] Peng Ning,et al. Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings , 2009, ESORICS.
[9] Josef Pieprzyk,et al. Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings , 2008, ASIACRYPT.
[10] Steve Drew,et al. EGovernment Stage Model: Evaluating the Rate of Web Development Progress of Government Websites in Saudi Arabia , 2012, ArXiv.
[11] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, ASIACRYPT.
[12] Ari Juels,et al. Proofs of retrievability: theory and implementation , 2009, CCSW '09.
[13] Wenjing Lou,et al. Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance , 2009, INFOCOM.
[14] R. Siva Ranjani,et al. Current Trends in Group Key Management , 2011 .
[15] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[16] Cong Wang,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[17] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.