-
1
-
-
21044449695
-
Persistent authenticated dictionaries and their applications
-
Anagnostopoulos, A., Goodrich, M.T., Tamassia, R.: Persistent authenticated dictionaries and their applications. In: Proc. Information Security Conference, pp. 379-393 (2001)
-
(2001)
Proc. Information Security Conference
, pp. 379-393
-
-
Anagnostopoulos, A.1
Goodrich, M.T.2
Tamassia, R.3
-
3
-
-
0026405370
-
Checking the correctness of memories
-
Blum, M., Evans, W., Gemmell, P., Kannan, S., Naor, M.: Checking the correctness of memories. In: Proc. Foundations of Comp. Science, pp. 90-99 (1991)
-
(1991)
Proc. Foundations of Comp. Science
, pp. 90-99
-
-
Blum, M.1
Evans, W.2
Gemmell, P.3
Kannan, S.4
Naor, M.5
-
4
-
-
36849043102
-
Efficient fork-linearizable access to untrusted shared memory
-
Cachin, C., Shelat, A., Shraer, A.: Efficient fork-linearizable access to untrusted shared memory. In: Proc. Principles of Distr. Computing, pp. 129-138 (2007)
-
(2007)
Proc. Principles of Distr. Computing
, pp. 129-138
-
-
Cachin, C.1
Shelat, A.2
Shraer, A.3
-
5
-
-
4444361800
-
The design and implementation of a transparent cryptographic file system for Unix
-
Cattaneo, G., Catuogno, L., Sorbo, A.D., Persiano, P.: The design and implementation of a transparent cryptographic file system for Unix. In: Proc. USENIX Annual Technical Conference, pp. 199-212 (2001)
-
(2001)
Proc. USENIX Annual Technical Conference
, pp. 199-212
-
-
Cattaneo, G.1
Catuogno, L.2
Sorbo, A.D.3
Persiano, P.4
-
7
-
-
0346739133
-
Fast and secure distributed read-only file system
-
Fu, K., Kaashoek, M.F., Mazières, D.: Fast and secure distributed read-only file system. ACM Trans. Comput. Syst. 20(1), 1-24 (2002)
-
(2002)
ACM Trans. Comput. Syst
, vol.20
, Issue.1
, pp. 1-24
-
-
Fu, K.1
Kaashoek, M.F.2
Mazières, D.3
-
8
-
-
56649091605
-
Arbre: A file system for untrusted remote block-level storage
-
Fujita, T., Ogawara, M.: Arbre: A file system for untrusted remote block-level storage. IPSJ Digital Courier 1, 381-393 (2005)
-
(2005)
IPSJ Digital Courier
, vol.1
, pp. 381-393
-
-
Fujita, T.1
Ogawara, M.2
-
9
-
-
84958039448
-
Integrity and performance in network attached storage
-
Gobioff, H., Nagle, D., Gibson, G.A.: Integrity and performance in network attached storage. In: Proc. International Symposium on High Performance Computing, pp. 244-256 (1999)
-
(1999)
Proc. International Symposium on High Performance Computing
, pp. 244-256
-
-
Gobioff, H.1
Nagle, D.2
Gibson, G.A.3
-
10
-
-
85033498470
-
SiRiUS: Securing Remote Untrusted Storage
-
Goh, E.-J., Shacham, H., Modadugu, N., Boneh, D.: SiRiUS: Securing Remote Untrusted Storage. In: Proc. Network and Distr. Sys. Security, pp. 131-145 (2003)
-
(2003)
Proc. Network and Distr. Sys. Security
, pp. 131-145
-
-
Goh, E.-J.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
11
-
-
84964426510
-
Implementation of an authenticated dictionary with skip lists and commutative hashing
-
Goodrich, M.T., Tamassia, R., Schwerin, A.: Implementation of an authenticated dictionary with skip lists and commutative hashing. In: Proc. DARPA Information Survivability Conference and Exposition, pp. 68-82 (2001)
-
(2001)
Proc. DARPA Information Survivability Conference and Exposition
, pp. 68-82
-
-
Goodrich, M.T.1
Tamassia, R.2
Schwerin, A.3
-
12
-
-
35248831605
-
Authenticated data structures for graph and geometric searching
-
Goodrich, M.T., Tamassia, R., Triandopoulos, N., Cohen, R.: Authenticated data structures for graph and geometric searching. In: Proc. RSA Conference-Cryptographers' Track, pp. 295-313 (2003)
-
(2003)
Proc. RSA Conference-Cryptographers' Track
, pp. 295-313
-
-
Goodrich, M.T.1
Tamassia, R.2
Triandopoulos, N.3
Cohen, R.4
-
13
-
-
37849010966
-
-
Jammalamadaka, R.C., Gamboni, R., Mehrotra, S., Seamons, K.E., Venkatasubramanian, N.: gVault: A gmail based cryptographic network file system. In: Proc. Conf. on Data and Applications Security, pp. 161-176 (2007)
-
Jammalamadaka, R.C., Gamboni, R., Mehrotra, S., Seamons, K.E., Venkatasubramanian, N.: gVault: A gmail based cryptographic network file system. In: Proc. Conf. on Data and Applications Security, pp. 161-176 (2007)
-
-
-
-
14
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: Scalable secure file sharing on untrusted storage. In: Proc. USENIX Conference on File and Storage Technologies, pp. 29-42 (2003)
-
(2003)
Proc. USENIX Conference on File and Storage Technologies
, pp. 29-42
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
15
-
-
77952379905
-
-
Li, J., Krohn, M.N., Mazières, D., Shasha, D.: Secure untrusted data repository (SUNDR. In: Proc. Operating Systems Design and Impl., pp. 121-136 (2004)
-
Li, J., Krohn, M.N., Mazières, D., Shasha, D.: Secure untrusted data repository (SUNDR. In: Proc. Operating Systems Design and Impl., pp. 121-136 (2004)
-
-
-
-
17
-
-
33947188085
-
Efficient authentication of large, dynamic data sets using galois/counter mode
-
McGrew, D.: Efficient authentication of large, dynamic data sets using galois/counter mode. In: Proc. Security in Storage Workshop, pp. 89-94 (2005)
-
(2005)
Proc. Security in Storage Workshop
, pp. 89-94
-
-
McGrew, D.1
-
18
-
-
84969346266
-
A certified digital signature
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218-238. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 218-238
-
-
Merkle, R.C.1
-
19
-
-
85084162873
-
Strong security for networkattached storage
-
Miller, E.L., Long, D.D.E., Freeman, W.E., Reed, B.: Strong security for networkattached storage. In: Proc. File and Storage Tech., pp. 1-13 (2002)
-
(2002)
Proc. File and Storage Tech
, pp. 1-13
-
-
Miller, E.L.1
Long, D.D.E.2
Freeman, W.E.3
Reed, B.4
-
20
-
-
33845196698
-
On consistency of encrypted files
-
Dolev, S, ed
-
Oprea, A., Reiter, M.K.: On consistency of encrypted files. In: Dolev, S. (ed.) Proc. International Symposium on Distributed Computing, pp. 254-268 (2006)
-
(2006)
Proc. International Symposium on Distributed Computing
, pp. 254-268
-
-
Oprea, A.1
Reiter, M.K.2
-
21
-
-
38149124657
-
Integrity checking in cryprographic file systems with constant trusted storage
-
Oprea, A., Reiter, M.K.: Integrity checking in cryprographic file systems with constant trusted storage. In: Proc. USENIX Security, pp. 183-198 (2007)
-
(2007)
Proc. USENIX Security
, pp. 183-198
-
-
Oprea, A.1
Reiter, M.K.2
-
22
-
-
77957830611
-
Space-efficient block storage integrity
-
Oprea, A., Reiter, M.K., Yang, K.: Space-efficient block storage integrity. In: Proc. Network and Distributed System Security Symposium, pp. 17-28 (2005)
-
(2005)
Proc. Network and Distributed System Security Symposium
, pp. 17-28
-
-
Oprea, A.1
Reiter, M.K.2
Yang, K.3
-
24
-
-
47249099483
-
Cryptographic security for a high-performance distributed file system
-
Pletka, R., Cachin, C: Cryptographic security for a high-performance distributed file system. In: Proc. Mass Storage Systems Tech., pp. 227-232 (2007)
-
(2007)
Proc. Mass Storage Systems Tech
, pp. 227-232
-
-
Pletka, R.1
Cachin, C.2
-
25
-
-
34547182340
-
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
-
Sarmenta, L.F.G., van Dijk, M., O'Donnell, C.W., Rhodes, J., Devadas, S.: Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. In: Proc. Workshop on Scalable Trusted Computing, pp. 27-41 (2006)
-
(2006)
Proc. Workshop on Scalable Trusted Computing
, pp. 27-41
-
-
Sarmenta, L.F.G.1
van Dijk, M.2
O'Donnell, C.W.3
Rhodes, J.4
Devadas, S.5
-
26
-
-
0020766586
-
A data structure for dynamic trees
-
Sleator, D.D., Tarjan, R.E.: A data structure for dynamic trees. J. Comput. Syst. Sci. 26(3), 362-381 (1983)
-
(1983)
J. Comput. Syst. Sci
, vol.26
, Issue.3
, pp. 362-381
-
-
Sleator, D.D.1
Tarjan, R.E.2
-
30
-
-
78649309769
-
Offline untrusted storage with immediate detection of forking and replay attacks
-
van Dijk, M., Rhodes, J., Sarmenta, L.F.G., Devadas, S.: Offline untrusted storage with immediate detection of forking and replay attacks. In: Proc. Workshop on Scalable Trusted Computing, pp. 41-48 (2007)
-
(2007)
Proc. Workshop on Scalable Trusted Computing
, pp. 41-48
-
-
van Dijk, M.1
Rhodes, J.2
Sarmenta, L.F.G.3
Devadas, S.4
|