Documents
Authors
Tables
Log in
Sign up
MetaCart
DMCA
Donate
Documents:
Advanced Search
Include Citations
Authors:
Advanced Search
Include Citations
Tables:
DMCA
Security Enhancement for Enabling Dynamic . . . (2014)
Cached
Download Links
[ijcert.org]
Save to List
Add to Collection
Correct Errors
Monitor Changes
by D. Ravikiran, et al.
Summary
Citations
Active Bibliography
Co-citation
Clustered Documents
Version History
Citations
753
Short signature from the Weil pairing
- Boneh, Lynn, et al. - 2001
520
Attribute-based encryption for fine-grained access control of encrypted data
- Goyal, Pandey, et al. - 2006
301
Provable data possession at untrusted stores.
- Ateniese, Burns, et al. - 2007
253
PORs: Proofs of retrievability for large files",
- Juels, Jr - 2007
228
Plutus: Scalable Secure File Sharing on Untrusted Storage.
- Kallahalla, Riedel, et al. - 2003
216
Pairing-Friendly Elliptic Curves of Prime Order. Selected Areas in Cryptography
- Barreto, Naehrig - 2006
202
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage,”
- Ateniese, Fu, et al. - 2006
197
Collusion resistant broadcast encryption with short ciphertexts and private keys
- Boneh, Gentry, et al.
196
Compact proofs of retrievability.
- Shacham, Waters - 2008
195
HAIL: A high-availability and integrity layer for cloud storage.
- Bowers, Juels, et al. - 2009
177
Enabling public verifiability and data dynamics for storage security in cloud computing
- Wang, Wang, et al. - 2009
169
Divertible Protocols and Atomic Proxy Cryptography,”
- Blaze, Bleumer, et al. - 1998
157
Scalable and efficient provable data possession.
- Ateniese, Pietro, et al. - 2008
147
Sirius: Securing Remote Untrusted Storage,”
- Goh, Shacham, et al. - 2003
133
Achieving secure, scalable, and fine-grained data access control in cloud computing,”
- Yu, Wang, et al. - 2010
125
Dynamic and efficient key management for access hierarchies,”
- Atallah, Blanton, et al. - 2009
122
Dynamic provable data possession,”
- Erway, Kupcu, et al. - 2009
83
Proofs of retrievability via hardness amplification.
- Dodis, Vadhan, et al. - 2009
77
Over-encryption: management of access control evolution on outsourced data.
- Vimercati, Foresti, et al. - 2007
65
Group sharing and random access in cryptographic storage file system”, Master’s thesis,
- Fu - 1999
59
Secure and efficient access to outsourced data.
- Wang, Li, et al. - 2012
47
MR.PDP: Multiple-replica provable data possession.
- Curtmola, Khan, et al. - 2008
38
Enabling security in cloud storage slas with cloudproof.
- Popa, Lorch, et al. - 2011
31
Efficient remote data possession checking in critical information infrastructures. In:
- Sebe, Domingo-Ferrer, et al. - 2007
29
Secure keyupdating for lazy revocation
- Backes, Cachin, et al.
24
Lotspiech, ‚Revocation and tracing schemes for stateless receivers
- Naor, Naor, et al. - 2001
14
Provable possession and replication of data over cloud servers,”
- Barsoum, Hasan - 2010
12
On verifying dynamic multiple data copies over cloud servers,” IACR Cryptology ePrint Archive,
- Barsoum, Hasan - 2011
7
Analysis of Integrity Vulnerabilities and a Non-repudiation Protocol for Cloud Data Storage Platforms,"
- Feng, Chen, et al.
4
A fair multi-party non-repudiation scheme for storage clouds
- Fangs, Chen, et al.
3
IEEE P1363.3 submission: Pairing-friendly elliptic curves of prime order with embedding degree 12
- Barrio, Naehrig - 2006
2
Demonstrating data possession and uncheatable
- Filho, Barreto - 2006