Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] J. Gantz and D. Reinsel, “The digital universe in 2020: Bigdigital shadows and biggest growth in the fareast,†http://www.emc.com/collateral/analystreports/idcthe-digital-universe-in-2020.pdf, Dec 2012. [2] M. O. Rabin, “Fingerprinting by random polynomials,†Center for Research in Computing Technology, Harvard University, Tech.Rep. Tech. Report TR-CSE-03-01, 1981. [3] J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer,“Reclaiming space from duplicate files in a serverless distributed file system.†in ICDCS, 2002, pp. 617–624. [4]M. Bellare, S. Keelveedhi, and T. Ristenpart, “Dupless: Server-aided encryption for deduplicated storage,†in USENIX Security Symposium, 2013. [5] “Message-locked encryption and secure deduplication,†in EUROCRYPT, 2013, pp. 296–312. [6]G. R. Blakley and C. Meadows, “Security of ramp schemes,†in Advances in Cryptology: Proceedings of CRYPTO ’84, ser. Lecture Notes in Computer Science, G. R. Blakley and D. Chaum, Eds.Springer-Verlag Berlin/Heidelberg, 1985, vol. 196, pp. 242–268. [7]A. D. Santis and B. Masucci, “Multiple ramp schemes,†IEEE Transactions on Information Theory, vol. 45, no. 5, pp. 1720–1728,Jul. 1999. [8]M. O. Rabin, “Efficient dispersal of information for security, load balancing, and fault tolerance,†Journal of the ACM, vol. 36, no. 2,pp. 335–348, Apr. 1989. [9]A. Shamir, “How to share a secret,†Commun. ACM, vol. 22, no. 11,pp. 612–613, 1979. [10]J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, “Secure deduplica-tion with efficient and reliable convergent key management,†in IEEE Transactions on Parallel and Distributed Systems, 2014, pp. vol.25(6), pp. 1615–1625. [11] S. Halevi, D. Harnik, B. Pinkas, and A. ShulmanPeleg, “Proofs of ownership in remote storage systems.†in ACM Conference on Computer and Communications Security, Y. Chen, G. Danezis, and V. Shmatikov, Eds. ACM, 2011, pp. 491–500. [12]J. S. Plank, S. Simmerman, and C. D. Schuman, “Jerasure: A library in C/C++ facilitating erasure coding for storage applications - Version 1.2,†University of Tennessee, Tech. Rep. CS-08-627,August 2008. [13] J. S. Plank and L. Xu, “Optimizing Cauchy Reed-solomon Codes for fault-tolerant network storage applications,†in NCA-06: 5th IEEE International Symposium on Network Computing Applications,Cambridge, MA, July 2006. [14] C. Liu, Y. Gu, L. Sun, B. Yan, and D. Wang, “Radmad: High reliability provision for large-scale deduplication archival storage systems,†in Proceedings of the 23rd international conference on Supercomputing, pp. 370–379.
![]() | V2I1281.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|