1 |
Amazon, 'Amazon simple storage servicc (Amazon S3).' [Online]. Availahlc: http://aws.amazon.com/s3
|
2 |
E. J. Goh, H. Shacham, N. Modadugu, and D. Bonch, 'SiRIUS: Securing remote untrusted storage,' in Proc. Network and Distributed System Security, 2003, pp.131-145
|
3 |
A. Heizmann, B. Palazzi, C. Paparnanthou, and R. Tamassia, 'Efficient integrity checking of untrusted network storage,' in Proc. 4th ACM International Workshop on Storage Security and Survivability, 2008, pp. 43-54
|
4 |
M. T. Goodrich, R. Tarnassia, and A. Schwerin, 'Implementatìon of an authenticated dictioinary with skip lists and cornrnutative hashing,' in Proc. DARPA Information Survívability Conference and Exposition II, 2001, pp.68-82
|
5 |
B. Ahoba, L. Blunk, J. Vollhrecht, J. Carlson, and H. Levkowetx, 'Extensible authentication protocol (EAP),' lETF RFC 3748, June 2004
|
6 |
C. Kaufman, 'Internel key exchange (TKEv2) protocol,' IETF RFC 4306, Dec.2005
|
7 |
R. Richardson, 'CSI survey 2007: The 12th annual computer crime and security survey,' Computer Security Institute, http://www.gocsi.com/forms/csi_survey.jhtml, 2007
|
8 |
E. Mykletun, M. Narasimha, and G. Tsudik, 'Authentication and integrity in outsourced datahases,' ACM Trans. Storage, vol. 2, no. 2, pp. 107-138, 2006
DOI
|
9 |
lETF, 'PPP extensible authentication protocol (EAP),' RFC 2284, March 1998
|
10 |
S. H. Shin, K. Kobara, and H. Imai, 'An efficient and Ieakage-resilient RSA-based authenticated key exchange protocol with tight security reduction,' IEICE Trans. Fundamentals of Electronics, Communications and Computer Sciences, vol. E90-A, no. 2, pp. 474-490, 2007
DOI
ScienceOn
|
11 |
Federal information processing standards publication 180-2, 'Secure hash standard (SHS),' Aug. 2002. [Online]. Available: http://csrc.nist.gov/publications/fips/fips 180-2/fips 180-2 withchangenotice.pdf
|
12 |
R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp.120-126, 1978
DOI
ScienceOn
|
13 |
S. H. Shin, K. Kobara, and H. Imai, 'A simple Ieakage-resilient authenticated key establishment protocol, its extensions, and applications,' IEICE Trans. Fund. Electronics, Commun. and Computer Sciences, vol. E88-A, no. 3, pp. 736-754, Mar. 2005
DOI
ScienceOn
|
14 |
E. L. Miller, W. E. Freeman, D. D. E. Long, and B. C. Reed, 'Strong security for network-attached storage,' in Proc. USENIX Conference on File and Storage Thchnologies, Jan. 2002
|
15 |
D. Boneh, C. Gentry, B. Lynn, and H. Shacharn, 'Aggregate and verifiably encrypted signatures from hilincar rnaps,' in Proc. Eurocrypt 2003, 2003, LNCS 2656, pp. 416-432
|
16 |
BitTorrent Inc., 'BitTorrent.' [Online]. Available: http://www.hittorrent.com
|
17 |
IEEE PI363.2, 'Standard specifications for password-based public key cryptographic techniques.' [Online]. Availahle: http://grouper.ieee.org/groups/ 1363/passwdPK/submissions.html
|
18 |
S. H. Shin, K. Kobara, and H. Imai, 'Leakage-resilient authenticated key establishment protocols,' in Proc. Asiacrypt 2003, 2003, LNCS 2894, pp. 155-172
DOI
ScienceOn
|
19 |
lEEE P1363, 'lEEE standard specifications for public key cryptography,' Nov. 1999
|
20 |
A. Frier, P. Karlton, and P. Kocher, 'The SSL 3.0 protocol, 'Netscape Communication Corp. [Online]. Availahle: http://wp.netscape.com/eng/ss13
|
21 |
D. Harkins and D. Carrel, 'The lnternet Key Exchange (IKE),' IETF RFC 2409, Nov. 1998. [Online]. Availahle: http://www.ietf.org/rfc/rfc2409.txt
|
22 |
M. Bellare, R. Canetti, and H. Krawczyk, 'Keying hash fucntions for message authentication,' in Proc. Crypto'96, 1996, LNCS 1109, pp. 1-15
DOI
ScienceOn
|
23 |
lETF, 'Transport layer security (tls) charter,' [Online]. Available:
http://www .ietf.org/html.charters/tls-charter.html
|