|
Conferences in DBLP
Lazy Revocation in Cryptographic File Systems. [Citation Graph (, )][DBLP]
POTSHARDS : Storing Data for the Long-term Without Encryption. [Citation Graph (, )][DBLP]
Towards Protecting Sensitive Files in a Compromised System. [Citation Graph (, )][DBLP]
The OSD Security Protocol. [Citation Graph (, )][DBLP]
Efficiently Binding Data to Owners in Distributed Content-Addressable Storage Systems. [Citation Graph (, )][DBLP]
Maintaining Object Ordering in a Shared P2P Storage Environment. [Citation Graph (, )][DBLP]
Adding Secure Deletion to Your Favorite File System. [Citation Graph (, )][DBLP]
The Consequences of Decentralized Security in a Cooperative Storage System. [Citation Graph (, )][DBLP]
File System Design with Assured Delete. [Citation Graph (, )][DBLP]
Efficient Authentication of Large, Dynamic Data Sets Using Galois/Counter Mode (GCM). [Citation Graph (, )][DBLP]
Optimization of Covert Channel Identification. [Citation Graph (, )][DBLP]
|