Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
暂无分享,去创建一个
Cong Wang | Jin Li | Wenjing Lou | Kui Ren | Qian Wang | W. Lou | K. Ren | Cong Wang | Jin Li | Qian Wang | Wenjing Lou
[1] Ethan L. Miller,et al. Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[2] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[3] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[4] Michael K. Reiter,et al. Space-Efficient Block Storage Integrity , 2005, NDSS.
[5] Ari Juels,et al. Proofs of retrievability: theory and implementation , 2009, CCSW '09.
[6] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[7] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[8] Moni Naor,et al. The complexity of online memory checking , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).
[9] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[10] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[11] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[12] Jia Xu,et al. Remote Integrity Check with Dishonest Storage Server , 2008, ESORICS.
[13] Mary Baker,et al. Privacy-Preserving Audit and Extraction of Digital Contents , 2008, IACR Cryptol. ePrint Arch..
[14] Wenjing Lou,et al. Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance , 2009, IEEE INFOCOM 2009.