-
1
-
-
84929122608
-
Data deduplication will be even bigger in 2010
-
Available at:[accessed on 24 March 2014].
-
Russell D. Data deduplication will be even bigger in 2010. Gartner 2010. Available at: http://www.gartner.com/doc/1297513 [accessed on 24 March 2014].
-
(2010)
Gartner
-
-
Russell, D.1
-
3
-
-
84863932631
-
Dark clouds on the horizon: using cloud storage as attack vector and online slack space
-
San Francisco, CA
-
Mulazzani M, Schrittwieser S, Leithner M, Huber M, Weippl E. Dark clouds on the horizon: using cloud storage as attack vector and online slack space, Proceedings of USENIX Security Symposium (SEC'11), San Francisco, CA, 2011; 65-76.
-
(2011)
Proceedings of USENIX Security Symposium (SEC'11)
, pp. 65-76
-
-
Mulazzani, M.1
Schrittwieser, S.2
Leithner, M.3
Huber, M.4
Weippl, E.5
-
4
-
-
84872371278
-
Privacy-preserving cross-user source-based data deduplication in cloud storage
-
Jeju, Korea
-
Lee S, Choi D. Privacy-preserving cross-user source-based data deduplication in cloud storage, Proceedings of International Conference on ICT Convergence, Jeju, Korea, 2012; 329-330.
-
(2012)
Proceedings of International Conference on ICT Convergence
, pp. 329-330
-
-
Lee, S.1
Choi, D.2
-
5
-
-
84937000041
-
Improving the resistance to side-channel attacks on cloud storage services
-
Mobility and Security (NTMS'12), Istanbul, Turkey
-
Olivier, Neumann C, Montalvo L, Defrance S. Improving the resistance to side-channel attacks on cloud storage services, Proceedings of International Conference on New Technologies, Mobility and Security (NTMS'12), Istanbul, Turkey, 2012; 1-5.
-
(2012)
Proceedings of International Conference on New Technologies
, pp. 1-5
-
-
Olivier, N.C.1
Montalvo, L.2
Defrance, S.3
-
6
-
-
84937009470
-
Hybrid cloud gateway appliances expand cloud storage use cases
-
Available at:[accessed on 24 March 2014].
-
Zaffos S, Couture A. Hybrid cloud gateway appliances expand cloud storage use cases, Gartner 2011, Available at: http://www.gartner.com/doc/1516718 [accessed on 24 March 2014].
-
(2011)
Gartner
-
-
Zaffos, S.1
Couture, A.2
-
7
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
LNCS New York, NY
-
Dwork C, McSherry F, Nissim K, Smith A. Calibrating noise to sensitivity in private data analysis, Proceedings of Conference on Theory of Cryptography (TCC'06), LNCS, vol. 3876, New York, NY, 2006; 265-284.
-
(2006)
Proceedings of Conference on Theory of Cryptography (TCC'06)
, vol.3876
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
8
-
-
70349305273
-
Differential privacy: a survey of results
-
LNCS, vol., Xi'an, China
-
Dwork C. Differential privacy: a survey of results, Theory and Applications of Models of Computation, LNCS, vol. 4978, Xi'an, China, 2008; 1-19.
-
(2008)
Theory and Applications of Models of Computation
, vol.4978
, pp. 1-19
-
-
Dwork, C.1
-
9
-
-
77957582791
-
Differential privacy for statistics: what we know and what we want to learn
-
Dwork C, Smith A. Differential privacy for statistics: what we know and what we want to learn. Journal of Privacy and Confidentiality 2010; 1(2):135-154.
-
(2010)
Journal of Privacy and Confidentiality
, vol.1
, Issue.2
, pp. 135-154
-
-
Dwork, C.1
Smith, A.2
-
12
-
-
84869487159
-
Why eve and mallory love android: an analysis of android ssl (in)security
-
Raleigh, NC
-
Fahl S, Harbach M, Muders T, Baumgärtner L, Freisleben B, Smith M. Why eve and mallory love android: an analysis of android ssl (in)security, Proceedings of ACM Conference on Computer and Communications Security (CCS'12), Raleigh, NC, 2012; 50-61.
-
(2012)
Proceedings of ACM Conference on Computer and Communications Security (CCS'12)
, pp. 50-61
-
-
Fahl, S.1
Harbach, M.2
Muders, T.3
Baumgärtner, L.4
Freisleben, B.5
Smith, M.6
-
13
-
-
84884484198
-
On the security of the tls protocol: a systematic analysis
-
Advances in Cryptology-CRYPTO'13, LNCS, Santa Barbara, CA
-
Krawczyk H, Paterson KG, Wee H. On the security of the tls protocol: a systematic analysis, Advances in Cryptology-CRYPTO'13, LNCS, vol. 8042, Santa Barbara, CA, 2013; 429-448.
-
(2013)
, vol.8042
, pp. 429-448
-
-
Krawczyk, H.1
Paterson, K.G.2
Wee, H.3
|