The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Security in Storage Workshop (sisw)
2005 (conf/sisw/2005)


  1. Lazy Revocation in Cryptographic File Systems. [Citation Graph (, )][DBLP]


  2. POTSHARDS : Storing Data for the Long-term Without Encryption. [Citation Graph (, )][DBLP]


  3. Towards Protecting Sensitive Files in a Compromised System. [Citation Graph (, )][DBLP]


  4. The OSD Security Protocol. [Citation Graph (, )][DBLP]


  5. Efficiently Binding Data to Owners in Distributed Content-Addressable Storage Systems. [Citation Graph (, )][DBLP]


  6. Maintaining Object Ordering in a Shared P2P Storage Environment. [Citation Graph (, )][DBLP]


  7. Adding Secure Deletion to Your Favorite File System. [Citation Graph (, )][DBLP]


  8. The Consequences of Decentralized Security in a Cooperative Storage System. [Citation Graph (, )][DBLP]


  9. File System Design with Assured Delete. [Citation Graph (, )][DBLP]


  10. Efficient Authentication of Large, Dynamic Data Sets Using Galois/Counter Mode (GCM). [Citation Graph (, )][DBLP]


  11. Optimization of Covert Channel Identification. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002