暂无分享,去创建一个
[1] Aggelos Kiayias,et al. TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF , 2017, ACNS.
[2] Richard Cleve,et al. Limits on the security of coin flips when half the processors are faulty , 1986, STOC '86.
[3] Charu,et al. Multilevel security framework for cloud data , 2017, 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN).
[4] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[5] Joseph Bonneau,et al. The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords , 2012, 2012 IEEE Symposium on Security and Privacy.
[6] Vincent Haupert,et al. Where to Look for What You See Is What You Sign? User Confusion in Transaction Security , 2019, ESORICS.
[7] Claudio Orlandi,et al. Can You Trust Your Encrypted Cloud?: An Assessment of SpiderOakONE's Security , 2018, AsiaCCS.
[8] Mihir Bellare,et al. DupLESS: Server-Aided Encryption for Deduplicated Storage , 2013, USENIX Security Symposium.
[9] Yun Ling,et al. Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage , 2018, IEEE Transactions on Information Forensics and Security.
[10] Benny Pinkas,et al. Keyword Search and Oblivious Pseudorandom Functions , 2005, TCC.
[11] Aggelos Kiayias,et al. Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model , 2014, ASIACRYPT.
[12] Miguel Castro,et al. Farsite: federated, available, and reliable storage for an incompletely trusted environment , 2002, OPSR.
[13] Yehuda Lindell,et al. Fast Secure Two-Party ECDSA Signing , 2017, Journal of Cryptology.
[14] Cormac Herley,et al. A large-scale study of web password habits , 2007, WWW '07.
[15] Aggelos Kiayias,et al. Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online) , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[16] Rosario Gennaro,et al. Fast Multiparty Threshold ECDSA with Fast Trustless Setup , 2018, CCS.
[17] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[18] Darrell D. E. Long,et al. Secure data deduplication , 2008, StorageSS '08.
[19] N. Asokan,et al. OmniShare: Encrypted Cloud Storage for the Multi-Device Era , 2018, IEEE Internet Computing.
[20] Benny Pinkas,et al. Secure Deduplication of Encrypted Data without Additional Independent Servers , 2015, CCS.
[21] Pedro Querido,et al. Two Factor Encryption in Cloud Storage Providers Using Hardware Tokens , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).
[22] Bryan Ford,et al. Reducing Metadata Leakage from Encrypted Files and Communication with PURBs , 2018, Proc. Priv. Enhancing Technol..
[23] Hugo Krawczyk,et al. SPHINX: A Password Store that Perfectly Hides Passwords from Itself , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[24] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[25] Hugo Krawczyk,et al. Updatable Oblivious Key Management for Storage Systems , 2019, CCS.
[26] Bharat K. Bhargava,et al. Secure and efficient access to outsourced data , 2009, CCSW '09.
[27] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[28] Yang Tang,et al. Secure Overlay Cloud Storage with Access Control and Assured Deletion , 2012, IEEE Transactions on Dependable and Secure Computing.
[29] Amit Sahai,et al. Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization , 1999, CRYPTO.
[30] Abhi Shelat,et al. Secure Two-party Threshold ECDSA from ECDSA Assumptions , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[31] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[32] Joseph K. Liu,et al. Two-Factor Data Security Protection Mechanism for Cloud Storage System , 2016, IEEE Transactions on Computers.
[33] Rick Wash,et al. Understanding Password Choices: How Frequently Entered Passwords Are Re-used across Websites , 2016, SOUPS.
[34] Hovav Shacham,et al. SiRiUS: Securing Remote Untrusted Storage , 2003, NDSS.
[35] Nikita Borisov,et al. The Tangled Web of Password Reuse , 2014, NDSS.
[36] Marcel Keller,et al. Securing DNSSEC Keys via Threshold ECDSA From Generic MPC , 2020, IACR Cryptol. ePrint Arch..
[37] Lujo Bauer,et al. Of passwords and people: measuring the effect of password-composition policies , 2011, CHI.