The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Security in Storage Workshop (sisw)
2002 (conf/sisw/2002)

  1. Donald Beaver
    Network Security and Storage Security: Symmetries and Symmetry-Breaking. [Citation Graph (0, 0)][DBLP]
    IEEE Security in Storage Workshop, 2002, pp:3-9 [Conf]
  2. Alain Azagury, Ran Canetti, Michael Factor, Shai Halevi, Ealan Henis, Dalit Naor, Noam Rinetzky, Ohad Rodeh, Julian Satran
    A Two Layered Approach for Securing an Object Store Network. [Citation Graph (0, 0)][DBLP]
    IEEE Security in Storage Workshop, 2002, pp:10-23 [Conf]
  3. Benjamin Reed, Mark A. Smith, Dejan Diklic
    Security Considerations When Designing a Distributed File System Using Object Storage Devices. [Citation Graph (0, 0)][DBLP]
    IEEE Security in Storage Workshop, 2002, pp:24-34 [Conf]
  4. Adrian Baldwin, Simon Shiu
    Encryption and Key management in a SAN. [Citation Graph (0, 0)][DBLP]
    IEEE Security in Storage Workshop, 2002, pp:35-44 [Conf]
  5. Yevgeniy Dodis, Moti Yung
    Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case. [Citation Graph (0, 0)][DBLP]
    IEEE Security in Storage Workshop, 2002, pp:45-52 [Conf]
  6. Axelle Apvrille, James Hughes, Vincent Girier
    Streamed or Detached Triple Integrity for a Time Stamped Secure Storage System. [Citation Graph (0, 0)][DBLP]
    IEEE Security in Storage Workshop, 2002, pp:53-64 [Conf]
  7. David Samyde, Sergei P. Skorobogatov, Ross J. Anderson, Jean-Jacques Quisquater
    On a New Way to Read Data from Memory. [Citation Graph (0, 0)][DBLP]
    IEEE Security in Storage Workshop, 2002, pp:65-69 [Conf]
  8. Shuang-Yi Tang, Ying-Ping Lu, David Hung-Chang Du
    Performance Study of Software-Based iSCSI Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security in Storage Workshop, 2002, pp:70-79 [Conf]
  9. Yongdae Kim, Maithili Narasimha, Fabio Maino, Gene Tsudik
    Secure Group Services for Storage Area Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Security in Storage Workshop, 2002, pp:80-93 [Conf]
  10. Theodore M. Wong, Chenxi Wang, Jeannette M. Wing
    Verifiable Secret Redistribution for Archive System. [Citation Graph (0, 0)][DBLP]
    IEEE Security in Storage Workshop, 2002, pp:94-106 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002