-
4
-
-
79955970253
-
-
Dan Boneh, Matthew K. Franklin, Ben Lynn, Matt Pauker, Rishi Kacker, and Gene Tsudik. Identity-based encryption download. http://crypto.stanford.edu/ibe/ download.html, 2002.
-
(2002)
Identity-based Encryption Download
-
-
Boneh, D.1
Franklin, M.K.2
Lynn, B.3
Pauker, M.4
Kacker, R.5
Tsudik, G.6
-
9
-
-
0346739133
-
Fast and secure distributed read-only file system
-
DOI 10.1145/505452.505453
-
Kevin Fu, M. Frans Kaashoek, and David Mazieres. Fast and secure distributed read-only file system. ACM Transactions on Computer Systems (TOCS), 20(1):1-24, 2002. (Pubitemid 135707562)
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.1
, pp. 1-24
-
-
Fu, K.1
Kaashoek, M.F.2
Mazieres, D.3
-
12
-
-
85077701725
-
Lest we remember: Cold boot attacks on encryption keys
-
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, and Edward W. Felten. Lest we remember: Cold boot attacks on encryption keys. In Proceedings of the 17th USENIX Security Symposium, 2008.
-
(2008)
Proceedings of the 17th USENIX Security Symposium
-
-
Alex Halderman, J.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
13
-
-
0023964787
-
Scale and performance in a distributed file system
-
DOI 10.1145/35037.35059
-
John H. Howard, Michael L. Kazar, Sherri G. Menees, David A. Nichols, M. Satyanarayanan, Robert N. Sidebotham, and Michael J. West. Scale and performance in a distributed file system. ACM Transactions on Computer Systems (TOCS), 6(1):51-81, 1988. (Pubitemid 18574134)
-
(1988)
ACM Transactions on Computer Systems
, vol.6
, Issue.1
, pp. 51-81
-
-
Howard John, H.1
Kazar Michael, L.2
Menees Sherri, G.3
Nichols David4
Satyanarayanan, M.5
Sidebotham Robert, N.6
West Michael, J.7
-
14
-
-
79952018667
-
-
Imperva. Consumer password worst practices. http://www.imperva.com/docs/ WP-Consumer-Password-Worst-Practices.pdf, 2010.
-
(2010)
Consumer Password Worst Practices
-
-
-
23
-
-
0031541392
-
Flexible update propagation for weakly consistent replication
-
Karin Peterson, Mike J. Spreitzer, Douglas B. Terry, Marvin M. Theimer, and Alan J. Demers. Flexible update propagation for weakly consistent replication. In Proceedings of the 16th ACM Symposium on Operating Systems Principles (SOSP '97), 1997.
-
(1997)
Proceedings of the 16th ACM Symposium on Operating Systems Principles (SOSP '97)
-
-
Peterson, K.1
Spreitzer, M.J.2
Terry, D.B.3
Theimer, M.M.4
Demers, A.J.5
-
26
-
-
79551689384
-
Privacy-preserving location tracking of lost or stolen devices: Cryptographic techniques and replacing trusted third parties with DHTs
-
Thomas Ristenpart, Gabriel Maganis, Arvind Krishnamurthy, and Tadayoshi Kohno. Privacy-preserving location tracking of lost or stolen devices: Cryptographic techniques and replacing trusted third parties with DHTs. In Proceedings of the 17th USENIX Security Symposium, 2008.
-
(2008)
Proceedings of the 17th USENIX Security Symposium
-
-
Ristenpart, T.1
Maganis, G.2
Krishnamurthy, A.3
Kohno, T.4
-
27
-
-
79955945299
-
-
Jordan Robertson. http://www.usatoday.com/tech/news/computersecurity/ 2010-02-08-security-chip-pc-hacked-N.htm, 2010.
-
(2010)
-
-
Robertson, J.1
-
29
-
-
0000432429
-
Design and implementation of the sun network file system
-
Russel Sandberg, David Goldberg, Steve Kleiman, Dan Walsh, and Bob Lyon. Design and implementation of the Sun network file system. In Proceedings of the USENIX Annual Technical Conference, 1985.
-
(1985)
Proceedings of the USENIX Annual Technical Conference
-
-
Sandberg, R.1
Goldberg, D.2
Kleiman, S.3
Walsh, D.4
Lyon, B.5
|