Private data deduplication protocols in cloud storage
暂无分享,去创建一个
[1] Benny Pinkas,et al. Side Channels in Cloud Services: Deduplication in Cloud Storage , 2010, IEEE Security & Privacy.
[2] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[3] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[4] S. Rajsbaum. Foundations of Cryptography , 2014 .
[5] 葉善衡,et al. Data Deduplication , 2009, Encyclopedia of Database Systems.
[6] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, ASIACRYPT.
[7] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[8] Benny Pinkas,et al. Proofs of ownership in remote storage systems , 2011, CCS '11.
[9] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[10] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[11] Sushil Jajodia,et al. Key management for multi-user encrypted databases , 2005, StorageSS '05.
[12] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[13] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[14] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[15] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .