-
2
-
-
33745213464
-
Improved Proxy re-encryption schemes with applications to secure distributed storage
-
Ateniese, M., Fu, K., “Improved Proxy re-encryption schemes with applications to secure distributed storage”, NDSS 2005.
-
(2005)
NDSS
-
-
Ateniese, M.1
Fu, K.2
-
3
-
-
0027764777
-
A cryptographic file system for Unix
-
Blaze, M., “A cryptographic file system for Unix”, CCS, 1993.
-
(1993)
CCS
-
-
Blaze, M.1
-
7
-
-
84957086893
-
How To Forget a Secret
-
Springer-Verlag
-
G. Di Crescenzo, N. Ferguson, R. Impagliazzo, and M. Jakobsson, "How To Forget a Secret.", STACS '99. LNCS 1563. Springer-Verlag, 1999. pp. 500-509.
-
(1999)
STACS '99. LNCS 1563
, pp. 500-509
-
-
Di Crescenzo, G.1
Ferguson, N.2
Impagliazzo, R.3
Jakobsson, M.4
-
8
-
-
85180533249
-
Key Management for Multi-user Encrypted Databases
-
Damiano, E., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi S., Samarati, P., “Key Management for Multi-user Encrypted Databases”, StorageSS’05, 2005.
-
(2005)
StorageSS’05
-
-
Damiano, E.1
De Capitani di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
11
-
-
85180535006
-
-
Disappearing, Inc., web site
-
Disappearing, Inc., web site: http://www.specimenbox.com/di/ab/hwdi.html
-
-
-
-
13
-
-
85033498470
-
SiRiUS: Security Remote Untrusted Storage
-
Goh, E., Shacham, H., Modadugu, N., and Boneh, D., “SiRiUS: Security Remote Untrusted Storage”, NDSS, 2003.
-
(2003)
NDSS
-
-
Goh, E.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
14
-
-
0004610703
-
Secure Deletion of Data from Magnetic and Solid-State Memory
-
Gutman, P, “Secure Deletion of Data from Magnetic and Solid-State Memory”, Usenix Security Symposium, 1996.
-
(1996)
Usenix Security Symposium
-
-
Gutman, P1
-
15
-
-
85180527677
-
-
U.S. Patent 4,424,414
-
Hellman, M, and Pohlig, S., U.S. Patent 4,424,414, 1984.
-
(1984)
-
-
Hellman, M1
Pohlig, S.2
-
16
-
-
85033460636
-
Plutus: Scalable Secure File Sharing on Untrusted Storage
-
Kallahala, M., Swaminathan, R., Fu, K., “Plutus: Scalable Secure File Sharing on Untrusted Storage”, FAST03, Usenix Conference on File and Storage Technologies, 2003.
-
(2003)
FAST03, Usenix Conference on File and Storage Technologies
-
-
Kallahala, M.1
Swaminathan, R.2
Fu, K.3
-
17
-
-
33244454312
-
Securing Distributed Storage: Challenges, Techniques, and Systems
-
Kher, V., Kim, Y., “Securing Distributed Storage: Challenges, Techniques, and Systems”, StorageSS’05, 2005.
-
(2005)
StorageSS’05
-
-
Kher, V.1
Kim, Y.2
-
20
-
-
84874283560
-
Secure Deletion for a Versioning File System
-
Peterson, Z., Burns, R., Herring, J., Stubblefield, A., Rubin, A., “Secure Deletion for a Versioning File System”, FAST ‘05: 4th Usenix Conference on File and Storage Technology, 2005.
-
(2005)
FAST ‘05: 4th Usenix Conference on File and Storage Technology
-
-
Peterson, Z.1
Burns, R.2
Herring, J.3
Stubblefield, A.4
Rubin, A.5
-
23
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R., Shamir, A., and Adleman, L., “A method for obtaining digital signatures and public-key cryptosystems”, Communications of the ACM, 1978.
-
(1978)
Communications of the ACM
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
25
-
-
0018545449
-
How to share a secret
-
Nov
-
A. Shamir, ``How to share a secret'', CACM, Vol. 22, Nov. 1979.
-
(1979)
CACM
, vol.22
-
-
Shamir, A.1
|