Sciweavers

2272 search results - page 1 / 455
» Provable Data Privacy
Sort
View
CCS
2007
ACM
13 years 11 months ago
Provable data possession at untrusted stores
Giuseppe Ateniese, Randal C. Burns, Reza Curtmola,...
DEXA
2005
Springer
93views Database» more  DEXA 2005»
13 years 10 months ago
Provable Data Privacy
In relational database systems a combination of privileges and views is employed to limit a user’s access and to hide non-public data. The data privacy problem is to decide wheth...
Kilian Stoffel, Thomas Studer
CCS
2010
ACM
13 years 5 months ago
Efficient provable data possession for hybrid clouds
Provable data possession is a technique for ensuring the integrity of data in outsourcing storage service. In this paper, we propose a cooperative provable data possession scheme ...
Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Ho...
CCS
2009
ACM
13 years 12 months ago
Dynamic provable data possession
As storage-outsourcing services and resource-sharing networks have become popular, the problem of efficiently proving the integrity of data stored at untrusted servers has receiv...
C. Christopher Erway, Alptekin Küpç&uu...
CCS
2004
ACM
13 years 10 months ago
Cryptanalysis of a provably secure CRT-RSA algorithm
We study a countermeasure proposed to protect Chinese remainder theorem (CRT) computations for RSA against fault attacks. The scheme was claimed to be provably secure. However, we...
David Wagner