-
4
-
-
85170005928
-
-
Bouncy Castle Crypto APIs. http://www.bouncycastle.org.
-
-
-
-
10
-
-
78751505426
-
-
Bluetooth SIG, Inc. version 3.0 + HS
-
Bluetooth SIG, Inc. Bluetooth specification version 3.0 + HS, 2009.
-
(2009)
Bluetooth Specification
-
-
-
11
-
-
20444490057
-
Off-the-record communication, or, why not to use PGP
-
New York, ACM
-
Nikita Borisov, Ian Goldberg, and Eric Brewer. Off-the-record communication, or, why not to use PGP. In Proceedings of the ACM Workshop on Privacy in the Electronic Society (WPES), pages 77-84, New York, 2004. ACM.
-
(2004)
Proceedings of the ACM Workshop on Privacy in the Electronic Society (WPES)
, pp. 77-84
-
-
Borisov, N.1
Goldberg, I.2
Brewer, E.3
-
18
-
-
1542593353
-
Authentication and authenticated key exchanges
-
Whitfield Diffie, Paul C. van Oorschot, and Michael J. Wiener. Authentication and authenticated key exchanges. Designs, Codes and Cryptography, 2(2):107-125, 1992.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
21
-
-
85018107502
-
Vanish: Increasing data privacy with self-destructing data
-
USENIX Association
-
Roxana Geambasu, Tadayoshi Kohno, Amit Levy, and Henry M. Levy. Vanish: Increasing data privacy with self-destructing data. In Proceedings of the 18th USENIX Security Symposium, pages 299-315. USENIX Association, 2009.
-
(2009)
Proceedings of the 18th USENIX Security Symposium
, pp. 299-315
-
-
Geambasu, R.1
Kohno, T.2
Levy, A.3
Levy, H.M.4
-
24
-
-
0004610703
-
Secure deletion of data from magnetic and solid-state memory
-
Berkeley, California, USENIX Association
-
Peter Gutmann. Secure deletion of data from magnetic and solid-state memory. In Proceedings of the 6th USENIX Security Symposium (SSYM), Focusing on Applications of Cryptography, pages 77-90, Berkeley, California, 1996. USENIX Association.
-
(1996)
Proceedings of the 6th USENIX Security Symposium (SSYM), Focusing on Applications of Cryptography
, pp. 77-90
-
-
Gutmann, P.1
-
25
-
-
85170015660
-
-
Disappearing Inc. http://www.disappearing-inc.com.
-
-
-
-
26
-
-
56749184065
-
Secure deletion for NAND flash file system
-
Jaeheung Lee, Junyoung Heo, Yookun Cho, Jiman Hong, and Sung Y. Shin. Secure deletion for NAND flash file system. In Proceedings of the ACM Symposium on Applied Computing (SAC), pages 1710-1714, 2008.
-
(2008)
Proceedings of the ACM Symposium on Applied Computing (SAC)
, pp. 1710-1714
-
-
Lee, J.1
Heo, J.2
Cho, Y.3
Hong, J.4
Shin, S.Y.5
-
30
-
-
84874283560
-
Secure deletion for a versioning file system
-
Berkeley, California, USENIX Association
-
Zachary N. J. Peterson, Randal Burns, Joe Herring, Adam Stubblefield, and Aviel D. Rubin. Secure deletion for a versioning file system. In Proceedings of the 4th USENIX Conference on File and Storage Technologies (FAST), pages 143-154, Berkeley, California, 2005. USENIX Association.
-
(2005)
Proceedings of the 4th USENIX Conference on File and Storage Technologies (FAST)
, pp. 143-154
-
-
Peterson, Z.N.J.1
Burns, R.2
Herring, J.3
Stubblefield, A.4
Rubin, A.D.5
-
31
-
-
0018545449
-
How to share a secret
-
Adi Shamir. How to share a secret. Commununications of the ACM, 22(11):612-613, 1979.
-
(1979)
Commununications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
33
-
-
85077070134
-
Life or death at block-level
-
Berkeley, California, USENIX Association
-
Muthian Sivathanu, Lakshmi N. Bairavasundaram, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau. Life or death at block-level. In Proceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI), pages 379-394, Berkeley, California, 2004. USENIX Association.
-
(2004)
Proceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 379-394
-
-
Sivathanu, M.1
Bairavasundaram, L.N.2
Arpaci-Dusseau, A.C.3
Arpaci-Dusseau, R.H.4
-
35
-
-
85170014280
-
-
NexusOne Smartphone
-
NexusOne Smartphone. http://www.htc.com.
-
-
-
-
36
-
-
85180531810
-
Defeating Vanish with low-cost Sybil attacks against large DHTs
-
ISOC
-
Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach, Brent Waters, and Emmett Witchel. Defeating Vanish with low-cost Sybil attacks against large DHTs. In Proceedings of the 17th Network and Distributed System Security Symposium (NDSS). ISOC, 2010.
-
(2010)
Proceedings of the 17th Network and Distributed System Security Symposium (NDSS)
-
-
Wolchok, S.1
Hofmann, O.S.2
Heninger, N.3
Felten, E.W.4
Halderman, J.A.5
Rossbach, C.J.6
Waters, B.7
Witchel, E.8
|