2009 Annual Computer Security Applications Conference 2009
DOI: 10.1109/acsac.2009.20
|View full text |Cite
|
Sign up to set email alerts
|

A Study of User-Friendly Hash Comparison Schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(28 citation statements)
references
References 6 publications
0
28
0
Order By: Relevance
“…Traditional cryptographic technologies for data integrity and availability, based on hash functions and signature schemes [9], [10], [11], cannot work on the outsourced data without a local copy of data. In addition, it is not a practical solution for data validation by downloading them due to the expensive communications, especially for large-size files.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Traditional cryptographic technologies for data integrity and availability, based on hash functions and signature schemes [9], [10], [11], cannot work on the outsourced data without a local copy of data. In addition, it is not a practical solution for data validation by downloading them due to the expensive communications, especially for large-size files.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Traditional cryptographic technologies for data integrity and availability, based on hash functions and signature schemes [8], [9], cannot work on the outsourced data without a local copy of data. Moreover, these traditional methods are not the practical solutions for data validation by downloading them due to the expensive communications, especially for largesize files.…”
Section: Related Workmentioning
confidence: 99%
“…For cloud computing scenario, the traditional cryptographic techniques do not work for ensuring data integrity. Without having local copy such schemes [4], [5] and [6] do not work and thus cannot provide a practical solution. As the communications become expensive, the traditional approaches can't be applied to outsourced data to cloud.…”
Section: IImentioning
confidence: 99%