Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach
暂无分享,去创建一个
[1] Tal Malkin. Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings , 2008, CT-RSA.
[2] Rasool Jalili,et al. A Signature-Based Approach of Correctness Assurance in Data Outsourcing Scenarios , 2011, ICISS.
[3] Josef Pieprzyk,et al. Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings , 2008, ASIACRYPT.
[4] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[5] Michael T. Goodrich,et al. Super-Efficient Verification of Dynamic Outsourced Databases , 2008, CT-RSA.
[6] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, ASIACRYPT.
[7] Adi Shamir,et al. How to share a secret , 1979, CACM.
[8] Rasool Jalili,et al. Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach , 2012, ICISS.
[9] Hakan Hacigümüs,et al. Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.
[10] Gene Tsudik,et al. Authentication of Outsourced Databases Using Signature Aggregation and Chaining , 2006, DASFAA.
[11] Xiaofeng Meng,et al. Integrity Auditing of Outsourced Data , 2007, VLDB.
[12] Stephen S. Yau,et al. Dynamic audit services for integrity verification of outsourced storages in clouds , 2011, SAC.