Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy
暂无分享,去创建一个
Shao-hui Wang | Dan-wei Chen | Zhi-wei Wang | Su-qin Chang | Shao-hui Wang | Zhi-wei Wang | Dan-wei Chen | Su-qin Chang
[1] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[2] Josep Domingo-Ferrer,et al. Efficient Remote Data Possession Checking in Critical Information Infrastructures , 2008, IEEE Transactions on Knowledge and Data Engineering.
[3] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[4] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[5] Nenghai Yu,et al. A Multiple-Replica Remote Data Possession Checking Protocol with Public Verifiability , 2010, 2010 Second International Symposium on Data, Privacy, and E-Commerce.
[6] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[7] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[8] Salve Bhagyashri Salve Bhagyashri,et al. Privacy-Preserving Public Auditing For Secure Cloud Storage , 2014 .
[9] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[10] Ari Juels,et al. Proofs of retrievability: theory and implementation , 2009, CCSW '09.
[11] Zoe L. Jiang,et al. Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013, IEEE Transactions on Computers.
[12] Mary Baker,et al. Auditing to Keep Online Storage Services Honest , 2007, HotOS.
[13] Yi Mu,et al. Asymmetric Group Key Agreement , 2009, EUROCRYPT.
[14] Ngoc Tram Anh Nguyen. Fair and dynamic proofs of retrievability , 2014 .
[15] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[16] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[17] Gene Tsudik,et al. Authentication and integrity in outsourced databases , 2006, TOS.
[18] Cong Wang,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[19] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.