|
Conferences in DBLP
- Donald Beaver
Network Security and Storage Security: Symmetries and Symmetry-Breaking. [Citation Graph (0, 0)][DBLP] IEEE Security in Storage Workshop, 2002, pp:3-9 [Conf]
- Alain Azagury, Ran Canetti, Michael Factor, Shai Halevi, Ealan Henis, Dalit Naor, Noam Rinetzky, Ohad Rodeh, Julian Satran
A Two Layered Approach for Securing an Object Store Network. [Citation Graph (0, 0)][DBLP] IEEE Security in Storage Workshop, 2002, pp:10-23 [Conf]
- Benjamin Reed, Mark A. Smith, Dejan Diklic
Security Considerations When Designing a Distributed File System Using Object Storage Devices. [Citation Graph (0, 0)][DBLP] IEEE Security in Storage Workshop, 2002, pp:24-34 [Conf]
- Adrian Baldwin, Simon Shiu
Encryption and Key management in a SAN. [Citation Graph (0, 0)][DBLP] IEEE Security in Storage Workshop, 2002, pp:35-44 [Conf]
- Yevgeniy Dodis, Moti Yung
Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case. [Citation Graph (0, 0)][DBLP] IEEE Security in Storage Workshop, 2002, pp:45-52 [Conf]
- Axelle Apvrille, James Hughes, Vincent Girier
Streamed or Detached Triple Integrity for a Time Stamped Secure Storage System. [Citation Graph (0, 0)][DBLP] IEEE Security in Storage Workshop, 2002, pp:53-64 [Conf]
- David Samyde, Sergei P. Skorobogatov, Ross J. Anderson, Jean-Jacques Quisquater
On a New Way to Read Data from Memory. [Citation Graph (0, 0)][DBLP] IEEE Security in Storage Workshop, 2002, pp:65-69 [Conf]
- Shuang-Yi Tang, Ying-Ping Lu, David Hung-Chang Du
Performance Study of Software-Based iSCSI Security. [Citation Graph (0, 0)][DBLP] IEEE Security in Storage Workshop, 2002, pp:70-79 [Conf]
- Yongdae Kim, Maithili Narasimha, Fabio Maino, Gene Tsudik
Secure Group Services for Storage Area Networks. [Citation Graph (0, 0)][DBLP] IEEE Security in Storage Workshop, 2002, pp:80-93 [Conf]
- Theodore M. Wong, Chenxi Wang, Jeannette M. Wing
Verifiable Secret Redistribution for Archive System. [Citation Graph (0, 0)][DBLP] IEEE Security in Storage Workshop, 2002, pp:94-106 [Conf]
|