-
2
-
-
4544387814
-
-
Technical Memo MIT-LCS-TM-632, Massachusetts Institute of Technology Laboratory for Computer Science, October
-
BATTEN, C., BARR, K., SARAF, A., AND TREPETIN, S. pStore: A secure peer-to-peer backup system. Technical Memo MIT-LCS-TM-632, Massachusetts Institute of Technology Laboratory for Computer Science, October 2002.
-
(2002)
pStore: A Secure Peer-to-Peer Backup System
-
-
Batten, C.1
Barr, K.2
Saraf, A.3
Trepetin, S.4
-
4
-
-
84937407719
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
Springer-Verlag. Lecture Notes in Computer Science
-
BELLARE, M., AND NAMPREMPRE, C. Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm. In Advances in Cryptology - Asiacrypt’00 Proceedings (2000), vol. 1976, Springer-Verlag. Lecture Notes in Computer Science.
-
(2000)
Advances in Cryptology - Asiacrypt’00 Proceedings
, vol.1976
-
-
Bellare, M.1
Namprempre, C.2
-
6
-
-
84958972496
-
High-bandwidth encryption with low-bandwidth smartcards
-
Lecture Notes in Computer Science
-
BLAZE, M. High-bandwidth encryption with low-bandwidth smartcards. In Fast Software Encryption (1996), vol. 1039, pp. 33–40. Lecture Notes in Computer Science.
-
(1996)
Fast Software Encryption
, vol.1039
, pp. 33-40
-
-
Blaze, M.1
-
7
-
-
84957651500
-
A formal treatment of remotely keyed encryption
-
Lecture Notes in Computer Science
-
BLAZE, M., FEIGENBAUM, J., AND NAOR, M. A formal treatment of remotely keyed encryption. In Advances in Cryptology – Eurocrypt’98 Proceedings (1998), vol. 1403, pp. 251–265. Lecture Notes in Computer Science.
-
(1998)
Advances in Cryptology – Eurocrypt’98 Proceedings
, vol.1403
, pp. 251-265
-
-
Blaze, M.1
Feigenbaum, J.2
Naor, M.3
-
9
-
-
84957063575
-
On the security properties of OAEP as an all-or-nothing transform
-
August Springer-Verlag,. Lecture Notes in Computer Science
-
BOYKO, V. On the security properties of OAEP as an all-or-nothing transform. In Advances in Cryptology - Crypto’99 Proceedings (August 1999), Springer-Verlag, pp. 503–518. Lecture Notes in Computer Science.
-
(1999)
Advances in Cryptology - Crypto’99 Proceedings
, pp. 503-518
-
-
Boyko, V.1
-
11
-
-
84889030419
-
Shredding your garbage: Reducing data lifetime through secure deallocation
-
August
-
CHOW, J., PFAFF, B., GARFINKEL, T., AND ROSENBLUM, M. Shredding your garbage: Reducing data lifetime through secure deallocation. In Proceedings of the USENIX Security Symposium (August 2005), pp. 331–346.
-
(2005)
Proceedings of the USENIX Security Symposium
, pp. 331-346
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Rosenblum, M.4
-
12
-
-
84885597052
-
Way-back: A user-level versioning file system for linux
-
June
-
CORNELL, B., DINDA, P. A., AND BUSTAMANTE, F. E. Way-back: A user-level versioning file system for Linux. In Proceedings of the USENIX Technical Conference, FREENIX Track (June 2004), pp. 19–28.
-
(2004)
Proceedings of the USENIX Technical Conference, FREENIX Track
, pp. 19-28
-
-
Cornell, B.1
Dinda, P.A.2
Bustamante, F.E.3
-
13
-
-
84957086893
-
How to forget a secret
-
Springer-Verlag,. Lecture Notes in Computer Science
-
CRESCENZO, G. D., FERGUSON, N., IMPAGLIAZZO, R., AND JAKOBSSON, M. How to forget a secret. In Proceedings of the Symposium on Theoretical Aspects of Computer Science (1999), vol. 1563, Springer-Verlag, pp. 500–509. Lecture Notes in Computer Science.
-
(1999)
Proceedings of the Symposium on Theoretical Aspects of Computer Science
, vol.1563
, pp. 500-509
-
-
Crescenzo, G.D.1
Ferguson, N.2
Impagliazzo, R.3
Jakobsson, M.4
-
14
-
-
35248852884
-
Concealment and its applications to authenticated encryption
-
Lecture Notes in Computer Science
-
DODIS, Y., AND AN, J. Concealment and its applications to authenticated encryption. In Advances in Cryptology – Eurocrypt’03 Proceedings (2003), vol. 2656. Lecture Notes in Computer Science.
-
(2003)
Advances in Cryptology – Eurocrypt’03 Proceedings
, vol.2656
-
-
Dodis, Y.1
An, J.2
-
16
-
-
3042825662
-
Remembrance of data passed: A study of disk sanitization practices
-
GARFINKEL, S. L., AND SHELAT, A. Remembrance of data passed: A study of disk sanitization practices. IEEE Security and Privacy 1, 1 (2003), 17–27.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.1
, pp. 17-27
-
-
Garfinkel, S.L.1
Shelat, A.2
-
17
-
-
0004610703
-
Secure deletion of data from magnetic and solid-state memory
-
July
-
GUTMANN, P. Secure deletion of data from magnetic and solid-state memory. In Proceedings of the USENIX Security Symposium (July 1996), pp. 77–90.
-
(1996)
Proceedings of the USENIX Security Symposium
, pp. 77-90
-
-
Gutmann, P.1
-
18
-
-
85084160278
-
Software generation of practically strong random numbers
-
January
-
GUTMANN, P. Software generation of practically strong random numbers. In Proceedings of the USENIX Security Symposium (January 1998), pp. 243–257.
-
(1998)
Proceedings of the USENIX Security Symposium
, pp. 243-257
-
-
Gutmann, P.1
-
20
-
-
0042484692
-
File system design for an NFS file server appliance
-
January
-
HITZ, D., LAU, J., AND MALCOM, M. File system design for an NFS file server appliance. In Proceedings of the Winter USENIX Technical Conference (January 1994), pp. 235–246.
-
(1994)
Proceedings of the Winter USENIX Technical Conference
, pp. 235-246
-
-
Hitz, D.1
Lau, J.2
Malcom, M.3
-
21
-
-
84957628646
-
Scramble all. Encrypt small
-
Lecture Notes in Computer Science
-
JAKOBSSON, M., STERN, J., AND YUNG, M. Scramble all. Encrypt small. In Fast Software Encryption (1999), vol. 1636. Lecture Notes in Computer Science.
-
(1999)
Fast Software Encryption
, vol.1636
-
-
Jakobsson, M.1
Stern, J.2
Yung, M.3
-
22
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
March
-
KALLAHALLA, M., RIEDEL, E., SWAMINATHAN, R., WANG, Q., AND FU, K. Plutus: Scalable secure file sharing on untrusted storage. In Proceedings of the USENIX Conference on File and Storage Technologies (FAST) (March 2003), pp. 29–42.
-
(2003)
Proceedings of the USENIX Conference on File and Storage Technologies (FAST)
, pp. 29-42
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
23
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
April
-
LUBY, M., AND RACKOFF, C. How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing 17, 2 (April 1988), 373–386.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
24
-
-
71949102204
-
The linux kernel cryptographic API
-
April
-
MORRIS, J. The Linux kernel cryptographic API. Linux Journal, 108 (April 2003).
-
(2003)
Linux Journal
, vol.108
-
-
Morris, J.1
-
25
-
-
85084162599
-
A versatile and user-oriented versioning file system
-
March
-
MUNISWAMY-REDDY, K.-K., WRIGHT, C. P., HIMMER, A., AND ZADOK, E. A versatile and user-oriented versioning file system. In Proceedings of the USENIX Conference on File and Storage Technologies (FAST) (March 2004), pp. 115–128.
-
(2004)
Proceedings of the USENIX Conference on File and Storage Technologies (FAST)
, pp. 115-128
-
-
Muniswamy-Reddy, K.-K.1
Wright, C.P.2
Himmer, A.3
Zadok, E.4
-
26
-
-
0036036764
-
A low-bandwidth network file system
-
October
-
MUTHITACHAROEN, A., CHEN, B., AND MAZIERES, D. A low-bandwidth network file system. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP) (October 2001), pp. 174–187.
-
(2001)
Proceedings of the ACM Symposium on Operating Systems Principles (SOSP)
, pp. 174-187
-
-
Muthitacharoen, A.1
Chen, B.2
Mazieres, D.3
-
27
-
-
33244463191
-
Ext3Cow: A time-shifting file system for regulatory compliance
-
PETERSON, Z., AND BURNS, R. Ext3cow: A time-shifting file system for regulatory compliance. ACM Transcations on Storage 1, 2 (2005), 190–212.
-
(2005)
ACM Transcations on Storage
, vol.1
, Issue.2
, pp. 190-212
-
-
Peterson, Z.1
Burns, R.2
-
29
-
-
84947912552
-
All-or-nothing encryption and the package transform
-
Lecture Notes in Computer Science
-
RIVEST, R. L. All-or-nothing encryption and the package transform. In Proceedings of the Fast Software Encryption Conference (1997), vol. 1267, pp. 210–218. Lecture Notes in Computer Science.
-
(1997)
Proceedings of the Fast Software Encryption Conference
, vol.1267
, pp. 210-218
-
-
Rivest, R.L.1
-
30
-
-
0035750947
-
OCB: A block-cipher mode of operation for efficient authenticated encryption
-
November
-
ROGAWAY, P., BELLARE, M., BLACK, J., AND KROVET, T. OCB: A block-cipher mode of operation for efficient authenticated encryption. In Proceedings of the ACM Conference on Computer and Communications Security (November 2001), pp. 196–205.
-
(2001)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 196-205
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
Krovet, T.4
-
31
-
-
0003731805
-
Characteristics of file system workloads
-
University of California, Berkeley, June
-
ROSELLI, D., AND ANDERSON, T. E. Characteristics of file system workloads. Research report, University of California, Berkeley, June 1996.
-
(1996)
Research Report
-
-
Roselli, D.1
Anderson, T.E.2
-
32
-
-
0042352263
-
Deciding when to forget in the elephant file system
-
December
-
SANTRY, D. J., FEELEY, M. J., HUTCHINSON, N. C., VEITCH, A. C., CARTON, R. W., AND OFIR, J. Deciding when to forget in the Elephant file system. In Proceedings of ACM Symposium on Operating Systems Principles (SOSP) (December 1999), pp. 110–123.
-
(1999)
Proceedings of ACM Symposium on Operating Systems Principles (SOSP)
, pp. 110-123
-
-
Santry, D.J.1
Feeley, M.J.2
Hutchinson, N.C.3
Veitch, A.C.4
Carton, R.W.5
Ofir, J.6
-
33
-
-
0018545449
-
How to share a secret
-
SHAMIR, A. How to share a secret. Communications of the ACM 22, 11 (1979), 612–613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
34
-
-
85077070134
-
Life or death at block-level
-
December
-
SIVATHANU, M., BAIRAVASUNDATAM, L., ARPACIDUSSAEU, A. C., AND ARPACI-DUSSEAU, R. H. Life or Death at Block-Level. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI) (December 2004), pp. 379–394.
-
(2004)
Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 379-394
-
-
Sivathanu, M.1
Bairavasundatam, L.2
Arpacidussaeu, A.C.3
Arpaci-Dusseau, R.H.4
-
35
-
-
84885648386
-
Metadata efficienc y in versioning file systems
-
March
-
SOULES, C. A. N., GOODSON, G. R., STRUNK, J. D., AND GANGER, G. R. Metadata efficienc y in versioning file systems. In Proceedings of the USENIX Conference on File and Storage Technologies (FAST) (March 2003), pp. 43–58.
-
(2003)
Proceedings of the USENIX Conference on File and Storage Technologies (FAST)
, pp. 43-58
-
-
Soules, C.A.N.1
Goodson, G.R.2
Strunk, J.D.3
Ganger, G.R.4
-
38
-
-
33646754186
-
Finding collisions in the full SHA-1
-
August Springer-Verlag. Lecture Notes in Computer Science. To appear
-
WANG, X., YIN, Y. L., AND YU, H. Finding collisions in the full SHA-1. In Advances in Cryptology - Crypto’05 Proceedings (August 2005), Springer-Verlag. Lecture Notes in Computer Science. To appear.
-
(2005)
Advances in Cryptology - Crypto’05 Proceedings
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
39
-
-
84948183524
-
Cryptographic file systems performance: What you don’t know can hurt you
-
October
-
WRIGHT, C., DAVE, J., AND ZADOK, E. Cryptographic file systems performance: What you don’t know can hurt you. In Proceedings of the IEEE Security in Storage Workshop (SISW) (October 2003), pp. 47–61.
-
(2003)
Proceedings of the IEEE Security in Storage Workshop (SISW)
, pp. 47-61
-
-
Wright, C.1
Dave, J.2
Zadok, E.3
-
40
-
-
27144515662
-
NcryptFs: A secure and convenient cryptographic file system
-
June
-
WRIGHT, C. P., MARTINO, M., AND ZADOK, E. NCryptfs: A secure and convenient cryptographic file system. In Proceedings of the USENIX Technical Conference (June 2003), pp. 197–210.
-
(2003)
Proceedings of the USENIX Technical Conference
, pp. 197-210
-
-
Wright, C.P.1
Martino, M.2
Zadok, E.3
-
42
-
-
0028549844
-
Magnetic force microscopy study of edge overwrite characteristics in thin film media
-
ZHU, J.-G., LUO, Y., AND DING, J. Magnetic force microscopy study of edge overwrite characteristics in thin film media. IEEE Transaction on Magnetics 30, 6 (1994), 4242–4244.
-
(1994)
IEEE Transaction on Magnetics
, vol.30
, Issue.6
, pp. 4242-4244
-
-
Zhu, J.-G.1
Luo, Y.2
Ding, J.3
|