-
1
-
-
77955337124
-
Data Retention and Anonymity Services
-
Matyáš, V., Fischer-Hübner, S., Cvrček, D., Švenda, P. (eds.) The Future of Identity. Springer, Heidelberg
-
Berthold, S., Böhme, R., Köpsell, S.: Data Retention and Anonymity Services. In: Matyáš, V., Fischer-Hübner, S., Cvrček, D., Švenda, P. (eds.) The Future of Identity. IFIP AICT, vol. 298, pp. 92-106. Springer, Heidelberg (2009)
-
(2009)
IFIP AICT
, vol.298
, pp. 92-106
-
-
Berthold, S.1
Böhme, R.2
Köpsell, S.3
-
2
-
-
84945135810
-
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
-
Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
-
Camenisch, J.L., Lysyanskaya, A.: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93-118. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 93-118
-
-
Camenisch, J.L.1
Lysyanskaya, A.2
-
3
-
-
77954327465
-
-
Tech. Rep. UCB/EECS-2010-5, University of California, Berkeley January
-
Chen, Y., Paxson, V., Katz, R.H.: What's new about cloud computing security? Tech. Rep. UCB/EECS-2010-5, EECS Department, University of California, Berkeley (January 2010), http://www.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS- 2010-5.html
-
(2010)
What's New about Cloud Computing Security?
-
-
Chen, Y.1
Paxson, V.2
Katz, R.H.3
-
4
-
-
0036184272
-
Protecting free expression online with freenet
-
Clarke, I., Miller, S.G., Hong, T.W., Sandberg, O., Wiley, B.: Protecting free expression online with freenet. IEEE Internet Computing 6(1), 40-49 (2002)
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.1
, pp. 40-49
-
-
Clarke, I.1
Miller, S.G.2
Hong, T.W.3
Sandberg, O.4
Wiley, B.5
-
7
-
-
0036373715
-
Reclaiming space from duplicate files in a serverless distributed file system
-
IEEE Computer Society, Washington, DC, USA
-
Douceur, J.R., Adya, A., Bolosky, W.J., Simon, D., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. In: ICDCS 2002: Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS 2002), p. 617. IEEE Computer Society, Washington, DC, USA (2002)
-
(2002)
ICDCS 2002: Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS 2002)
, pp. 617
-
-
Douceur, J.R.1
Adya, A.2
Bolosky, W.J.3
Simon, D.4
Theimer, M.5
-
8
-
-
84878723778
-
-
accessed May 17, 2011
-
Dropbox: Dropbox - simplify your life, https://www.dropbox.com/ (accessed May 17, 2011)
-
Dropbox - Simplify Your Life
-
-
-
10
-
-
38949169175
-
Cryptree: A folder tree structure for cryptographic file systems
-
Grolimund, D., Meisser, L., Schmid, S., Wattenhofer, R.: Cryptree: A folder tree structure for cryptographic file systems. In: Symposium on Reliable Distributed Systems, pp. 189-198 (2006)
-
(2006)
Symposium on Reliable Distributed Systems
, pp. 189-198
-
-
Grolimund, D.1
Meisser, L.2
Schmid, S.3
Wattenhofer, R.4
-
11
-
-
78650053109
-
Side channels in cloud services: Deduplication in cloud storage
-
Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side channels in cloud services: Deduplication in cloud storage. IEEE Security & Privacy 8(6), 40-47 (2010)
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.6
, pp. 40-47
-
-
Harnik, D.1
Pinkas, B.2
Shulman-Peleg, A.3
-
12
-
-
77956137294
-
Cryptographic Cloud Storage
-
Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) FC 2010 Workshops. Springer, Heidelberg
-
Kamara, S., Lauter, K.: Cryptographic Cloud Storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) FC 2010 Workshops. LNCS, vol. 6054, pp. 136-149. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6054
, pp. 136-149
-
-
Kamara, S.1
Lauter, K.2
-
13
-
-
84865472153
-
CS2: A semantic cryptographic cloud storage system
-
Tech. Rep. MSR-TR-2011-58, May
-
Kamara, S., Papamanthou, C., Roeder, T.: CS2: A semantic cryptographic cloud storage system. Tech. Rep. MSR-TR-2011-58, Microsoft Technical Report (May 2011), http://research.microsoft.com/apps/pubs/?id=148632
-
(2011)
Microsoft Technical Report
-
-
Kamara, S.1
Papamanthou, C.2
Roeder, T.3
-
14
-
-
84865479939
-
I know where you are and what you are sharing: Exploiting P2P communications to invade users' privacy
-
abs/1109.4039
-
Le-Blond, S., Chao, Z., Legout, A., Ross, K.W., Dabbous, W.: I know where you are and what you are sharing: Exploiting P2P communications to invade users' privacy. CoRR abs/1109.4039 (2011)
-
(2011)
CoRR
-
-
Le-Blond, S.1
Chao, Z.2
Legout, A.3
Ross, K.W.4
Dabbous, W.5
-
15
-
-
84865479940
-
Spying the world from your laptop - Identifying and profiling content providers and big downloaders in bittorrent
-
abs/1004.0930
-
Le-Blond, S., Legout, A., Fessant, F.L., Dabbous, W., Kâafar, M.A.: Spying the world from your laptop - identifying and profiling content providers and big downloaders in bittorrent. CoRR abs/1004.0930 (2010)
-
(2010)
CoRR
-
-
Le-Blond, S.1
Legout, A.2
Fessant, F.L.3
Dabbous, W.4
Kâafar, M.A.5
-
18
-
-
84865479938
-
-
paysafecard.com, (accessed November 20, 2011)
-
Paysafecard: Discover the prepaid solution for the internet : paysafecard.com, http://www.paysafecard.com (accessed November 20, 2011)
-
Discover the Prepaid Solution for the Internet
-
-
-
19
-
-
84857773390
-
Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud Resources
-
Miri, A., Vaudenay, S. (eds.) SAC 2011. Springer, Heidelberg
-
Slamanig, D.: Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud Resources. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol. 7118, pp. 73-91. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7118
, pp. 73-91
-
-
Slamanig, D.1
-
20
-
-
78650851875
-
Caught in the cloud: Privacy, encryption, and government back doors in theWeb 2.0 era
-
Soghoian, C.: Caught in the cloud: Privacy, encryption, and government back doors in theWeb 2.0 era. Journal on Telecommunications and High Technology Law 8(2), 359-424 (2010), http://www.jthtl.org/content/articles/V8I2/JTHTLv8i2- Soghoian.PDF
-
(2010)
Journal on Telecommunications and High Technology Law
, vol.8
, Issue.2
, pp. 359-424
-
-
Soghoian, C.1
-
21
-
-
84865479937
-
-
spideroak.com, (accessed November 15, 2011)
-
SpiderOak: Zero-knowledge data backup, sync, access, storage and share from any device - spideroak.com, https://spideroak.com/ (accessed November 15, 2011)
-
Zero-knowledge Data Backup, Sync, Access, Storage and Share from Any Device
-
-
-
24
-
-
84865526620
-
-
accessed August 12, 2011
-
Wikipedia: Five ws - wikipedia, the free encyclopedia (2011), https://secure.wikimedia.org/wikipedia/en/w/index.php?title=Five Ws&oldid=442072782 (accessed August 12, 2011)
-
(2011)
Five Ws - Wikipedia, the Free Encyclopedia
-
-
-
25
-
-
84865474782
-
-
accessed February 18, 2012
-
Wikipedia: Friend-to-friend - wikipedia, the free encyclopedia (2012), http://en.wikipedia.org/w/index.php?title=Friend-to-friend&oldid=474069021 (accessed February 18, 2012)
-
(2012)
Friend-to-friend - Wikipedia, the Free Encyclopedia
-
-
-
26
-
-
67650346359
-
Tahoe: The least-authority filesystem
-
ACM, New York
-
Wilcox-O'Hearn, Z., Warner, B.: Tahoe: the least-authority filesystem. In: Proceedings of the 4th ACM International Workshop on Storage Security and Survivability (StorageSS 2008), pp. 21-26. ACM, New York (2008), http://portal.acm.org/citation.cfm?id=1456474$#$
-
(2008)
Proceedings of the 4th ACM International Workshop on Storage Security and Survivability (StorageSS 2008)
, pp. 21-26
-
-
Wilcox-O'Hearn, Z.1
Warner, B.2
-
27
-
-
84865507944
-
-
wired.com (accessed August 12, 2011)
-
Wired: Wikileaks posts mysterious 'insurance' file - threat level - wired.com (2011), http://www.wired.com/threatlevel/2010/07/wikileaks-insurance- file/ (accessed August 12, 2011)
-
(2011)
Wikileaks Posts Mysterious 'Insurance' File - Threat Level
-
-
|