Acknowledgement
Grant : 사이버 공격의 사전 사후 대응을 위한 사이버 블랙박스 및 통합 사이버보안 상황분석 기술 개발
Supported by : 정보통신기술진흥센터
References
- Kaaniche, Nesrine, M, Laurent, "A Secure Client Side Deduplication Scheme in Cloud Storage Environments," New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on, lEEE, 2014.
- Douceur, R. John, "Reclaiming space from duplicate files in a serverless distributed file system," Distributed Computing Systems, 2002, Proceedings, 22nd International Conference on, IEEE, 2002.
- Camenisch, Jan, G. Neven, "Simulatable adaptive oblivious transfer," Advances in Cryptology-EUROCRYPT, Springer Berlin Heidelberg, 2007, 573-590.
- Naor, Moni, O. Reingold. "Number-theoretic constructions of efficient pseudo-random functions," Journal of the ACM (JACM) 51,2 (2004): 231-262. https://doi.org/10.1145/972639.972643
- Bellare, Mihir, S. Keelveedhi, T. Ristenpart, "DupLESS: server-aided encryption for deduplicated storage," Proceedings of the 22nd USENIX conference on Security, USENIX Association, 2013.
- Halevi, Shai, "Proofs of ownership in remote storage systems," Proceedings of the 18th ACM conference on Computer and communications security, ACM, 2011.
- Merkle, C. Ralph, "A certified digital signature," Advances in Cryptology-CRYPTO'89 Proceedings, Springer New York, 1990.