-
1
-
-
1442335350
-
-
IETF Network Working Group
-
ADAMS, C., CAIN, P., PINKAS, D., AND ZUCCHERATO, R. IETF RFC 3161 Time-Stamp Protocol (TSP). IETF Network Working Group, 2001.
-
(2001)
IETF RFC 3161 Time-Stamp Protocol (TSP)
-
-
Adams, C.1
Cain, P.2
Pinkas, D.3
Zuccherato, R.4
-
3
-
-
35048891868
-
Keying hash functions for message authentication
-
Springer-Verlag,. Lecture Notes in Computer Science
-
BELLARE, M., CANETTI, R., AND KRAWCZYK, H. Keying hash functions for message authentication. In Advances in Cryptology - Crypto’96 Proceedings (1996), vol. 1109, Springer-Verlag, pp. 1–19. Lecture Notes in Computer Science.
-
(1996)
Advances in Cryptology - Crypto’96 Proceedings
, vol.1109
, pp. 1-19
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
4
-
-
0345350047
-
Incremental cryptography and application to virus protection
-
May-June
-
BELLARE, M., GOLDREICH, O., AND GOLDWASSER, S. Incremental cryptography and application to virus protection. In Proceedings of the ACM Symposium on the Theory of Computing (May-June 1995), pp. 45–56.
-
(1995)
Proceedings of the ACM Symposium on the Theory of Computing
, pp. 45-56
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
5
-
-
84954417747
-
XOR MACS: New methods for message authentication using finite pseudorandom functions
-
Springer-Verlag,. Lecture Notes in Computer Science
-
BELLARE, M., GUÉRIN, R., AND ROGAWAY, P. XOR MACs: New methods for message authentication using finite pseudorandom functions. In Advances in Cryptology - Crypto’95 Proceedings (1995), vol. 963, Springer-Verlag, pp. 15–28. Lecture Notes in Computer Science.
-
(1995)
Advances in Cryptology - Crypto’95 Proceedings
, vol.963
, pp. 15-28
-
-
Bellare, M.1
Guérin, R.2
Rogaway, P.3
-
6
-
-
84947265149
-
A block-cipher mode of operation for parallelizable message authentication
-
Springer-Verlag,. Lecture Notes in Computer Science
-
BLACK, J., AND ROGAWAY, P. A block-cipher mode of operation for parallelizable message authentication. In Advances in Cryptology - Eurocrypt’02 Proceedings (2002), vol. 2332, Springer-Verlag, pp. 384 – 397. Lecture Notes in Computer Science.
-
(2002)
Advances in Cryptology - Eurocrypt’02 Proceedings
, vol.2332
, pp. 384-397
-
-
Black, J.1
Rogaway, P.2
-
7
-
-
33244492170
-
Verifiable audit trails for a versioning file system
-
November
-
BURNS, R., PETERSON, Z., ATENIESE, G., AND BONO, S. Verifiable audit trails for a versioning file system. In Proceedings of the ACM CCS Workshop on Storage Security and Survivability (November 2005), pp. 44–50.
-
(2005)
Proceedings of the ACM CCS Workshop on Storage Security and Survivability
, pp. 44-50
-
-
Burns, R.1
Peterson, Z.2
Ateniese, G.3
Bono, S.4
-
8
-
-
33244464180
-
Approximate message authentication and biometric entity authentication
-
February-March
-
CRESCENZO, G. D., GRAVEMAN, R., GE, R., AND ARCE, G. Approximate message authentication and biometric entity authentication. In Proceedings of Financial Cryptography and Data Security (February-March 2005).
-
(2005)
Proceedings of Financial Cryptography and Data Security
-
-
Crescenzo, G.D.1
Graveman, R.2
Ge, R.3
Arce, G.4
-
9
-
-
0036041927
-
Wide-area cooperative storage with CFS
-
October
-
DABEK, F., KAASHOEK, M. F., KARGER, D., MORRIS, R., AND STOICA, I. Wide-area cooperative storage with CFS. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP) (October 2001), pp. 202–215.
-
(2001)
Proceedings of the ACM Symposium on Operating Systems Principles (SOSP)
, pp. 202-215
-
-
Dabek, F.1
Kaashoek, M.F.2
Karger, D.3
Morris, R.4
Stoica, I.5
-
11
-
-
85077220466
-
Passive NFS tracing of email and research workloads
-
March
-
ELLARD, D., LEDLIE, J., MALKANI, P., AND SELTZER, M. Passive NFS tracing of email and research workloads. In Proceedings of the USENIX File and Storage Technologies Conference (FAST) (March 2003), pp. 203–216.
-
(2003)
Proceedings of the USENIX File and Storage Technologies Conference (FAST)
, pp. 203-216
-
-
Ellard, D.1
Ledlie, J.2
Malkani, P.3
Seltzer, M.4
-
13
-
-
0346739133
-
Fast and secure distributed read-only file system
-
FU, K., KASSHOEK, M. F., AND MAZIÈRES, D. Fast and secure distributed read-only file system. ACM Transactions on Computer Systems 20, 1 (2002), 1–24.
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.1
, pp. 1-24
-
-
Fu, K.1
Kasshoek, M.F.2
Mazières, D.3
-
14
-
-
0023978621
-
The cedar file system
-
March
-
GIFFORD, D. K., NEEDHAM, R. M., AND SCHROEDER, M. D. The Cedar file system. Communications of the ACM 31, 3 (March 1988), 288–298.
-
(1988)
Communications of the ACM
, vol.31
, Issue.3
, pp. 288-298
-
-
Gifford, D.K.1
Needham, R.M.2
Schroeder, M.D.3
-
15
-
-
21844468546
-
Tamper-resistant storage techniques for multimedia systems
-
January
-
HAUBERT, E., TUCEK, J., BRUMBAUGH, L., AND YURCIK, W. Tamper-resistant storage techniques for multimedia systems. In IS&T/SPIE Symposium Electronic Imaging Storage and Retrieval Methods and Applications for Multimedia (EI121) (January 2005), pp. 30–40.
-
(2005)
IS&T/SPIE Symposium Electronic Imaging Storage and Retrieval Methods and Applications for Multimedia (EI121)
, pp. 30-40
-
-
Haubert, E.1
Tucek, J.2
Brumbaugh, L.3
Yurcik, W.4
-
17
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
March
-
KALLAHALLA, M., RIEDEL, E., SWAMINATHAN, R., WANG, Q., AND FU, K. Plutus: Scalable secure file sharing on untrusted storage. In Proceedings of the USENIX Conference on File and Storage Technologies (FAST) (March 2003), pp. 29–42.
-
(2003)
Proceedings of the USENIX Conference on File and Storage Technologies (FAST)
, pp. 29-42
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
18
-
-
17544377746
-
OceanStore: An architecture for global-scale persistent storage
-
November
-
KUBIATOWICZ, J., BINDEL, D., CHEN, Y., CZERWINSKI, S., EATON, P., GEELS, D., GUMMANDI, R., RHEA, S., WEATHERSPOON, H., WEIMER, W., WELLS, C., AND ZHAO, B. OceanStore: An architecture for global-scale persistent storage. In Proceedings of the ACM Conference on Architecture Support for Programming Languages and Operating Systems (ASPLOS) (November 2000), pp. 190–201.
-
(2000)
Proceedings of the ACM Conference on Architecture Support for Programming Languages and Operating Systems (ASPLOS)
, pp. 190-201
-
-
Kubiatowicz, J.1
Bindel, D.2
Chen, Y.3
Czerwinski, S.4
Eaton, P.5
Geels, D.6
Gummandi, R.7
Rhea, S.8
Weatherspoon, H.9
Weimer, W.10
Wells, C.11
Zhao, B.12
-
20
-
-
0019634370
-
Password authentication with insecure comunication
-
LAMPORT, L. Password authentication with insecure comunication. Communications of the ACM 24, 11 (1981), 770–772.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
23
-
-
0004179384
-
-
Tech. Rep. MIT/LCS/TM-542b, Massachusetts Institute of Technology
-
MICALI, S. Efficient certificate revocation. Tech. Rep. MIT/LCS/TM-542b, Massachusetts Institute of Technology, 1996.
-
(1996)
Efficient Certificate Revocation
-
-
Micali, S.1
-
25
-
-
71949102204
-
The linux kernel cryptographic API
-
April
-
MORRIS, J. The Linux kernel cryptographic API. Linux Journal, 108 (April 2003).
-
(2003)
Linux Journal
, vol.108
-
-
Morris, J.1
-
26
-
-
85076227002
-
Provenance-aware storage systems
-
June
-
MUNISWAMY-REDDY, K.-K., HOLAND, D. A., BRAUN, U., AND SELTZER, M. Provenance-aware storage systems. In Proceedings of the USENIX Annual Technical Conference (June 2006).
-
(2006)
Proceedings of the USENIX Annual Technical Conference
-
-
Muniswamy-Reddy, K.-K.1
Holand, D.A.2
Braun, U.3
Seltzer, M.4
-
27
-
-
85084162599
-
A versatile and user-oriented versioning file system
-
March
-
MUNISWAMY-REDDY, K.-K., WRIGHT, C. P., HIMMER, A., AND ZADOK, E. A versatile and user-oriented versioning file system. In Proceedings of the USENIX Conference on File and Storage Technologies (FAST) (March 2004), pp. 115–128.
-
(2004)
Proceedings of the USENIX Conference on File and Storage Technologies (FAST)
, pp. 115-128
-
-
Muniswamy-Reddy, K.-K.1
Wright, C.P.2
Himmer, A.3
Zadok, E.4
-
28
-
-
0003508562
-
-
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY. Federal Information Processing Standards (FIPS) Publication 186, May
-
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY. Digital signature standard (DSS). Federal Information Processing Standards (FIPS) Publication 186, May 1994.
-
(1994)
Digital Signature Standard (DSS)
-
-
-
31
-
-
33244463191
-
Ext3Cow: A time-shifting file system for regulatory compliance
-
PETERSON, Z., AND BURNS, R. Ext3cow: A time-shifting file system for regulatory compliance. ACM Transcations on Storage 1, 2 (2005), 190–212.
-
(2005)
ACM Transcations on Storage
, vol.1
, Issue.2
, pp. 190-212
-
-
Peterson, Z.1
Burns, R.2
-
32
-
-
84874283560
-
Secure deletion for a versioning file system
-
December
-
PETERSON, Z. N. J., BURNS, R., HERRING, J., STUBBLE-FIELD, A., AND RUBIN, A. Secure deletion for a versioning file system. In Proceedings of the USENIX Conference on File And Storage Technologies (FAST) (December 2005), pp. 143–154.
-
(2005)
Proceedings of the USENIX Conference on File and Storage Technologies (FAST)
, pp. 143-154
-
-
Peterson, Z.N.J.1
Burns, R.2
Herring, J.3
Stubble-Field, A.4
Rubin, A.5
-
34
-
-
84947912552
-
All-or-nothing encryption and the package transform
-
Lecture Notes in Computer Science
-
RIVEST, R. L. All-or-nothing encryption and the package transform. In Proceedings of the Fast Software Encryption Conference (1997), vol. 1267, pp. 210–218. Lecture Notes in Computer Science.
-
(1997)
Proceedings of the Fast Software Encryption Conference
, vol.1267
, pp. 210-218
-
-
Rivest, R.L.1
-
35
-
-
0003731805
-
-
Research report, University of California, Berkeley, June
-
ROSELLI, D., AND ANDERSON, T. E. Characteristics of file system workloads. Research report, University of California, Berkeley, June 1996.
-
(1996)
Characteristics of File System Workloads
-
-
Roselli, D.1
Anderson, T.E.2
-
36
-
-
85084163129
-
A comparison of file system workloads
-
ROSELLI, D., LORCH, J., AND ANDERSON, T. A comparison of file system workloads. In Proceedings of the USENIX Technical Conference (2000), pp. 41–54.
-
(2000)
Proceedings of the USENIX Technical Conference
, pp. 41-54
-
-
Roselli, D.1
Lorch, J.2
Anderson, T.3
-
37
-
-
85021950441
-
Secure audit logs to support computer forensics
-
SCHNEIER, B., AND KELSEY, J. Secure audit logs to support computer forensics. ACM Transactions on Information Systems Security 2, 2 (1999), 159–176.
-
(1999)
ACM Transactions on Information Systems Security
, vol.2
, Issue.2
, pp. 159-176
-
-
Schneier, B.1
Kelsey, J.2
-
38
-
-
84885648386
-
Metadata efficiency in versioning file systems
-
March
-
SOULES, C. A. N., GOODSON, G. R., STRUNK, J. D., AND GANGER, G. R. Metadata efficiency in versioning file systems. In Proceedings of the USENIX Conference on File and Storage Technologies (FAST) (March 2003), pp. 43–58.
-
(2003)
Proceedings of the USENIX Conference on File and Storage Technologies (FAST)
, pp. 43-58
-
-
Soules, C.A.N.1
Goodson, G.R.2
Strunk, J.D.3
Ganger, G.R.4
-
41
-
-
85084163931
-
Publius: A robust, tamper-evident, censorship-resistant, web publishing system
-
August
-
WALDMAN, M., RUBIN, A. D., AND CRANOR, L. F. Publius: A robust, tamper-evident, censorship-resistant, Web publishing system. In Proceedings of the USENIX Security Symposium (August 2000), pp. 59–72.
-
(2000)
Proceedings of the USENIX Security Symposium
, pp. 59-72
-
-
Waldman, M.1
Rubin, A.D.2
Cranor, L.F.3
-
42
-
-
35248827014
-
Naming and integrity: Self-verifying data in peer-to-peer systems
-
June
-
WEATHERSPOON, H., WELLS, C., AND KUBIATOWICZ, J. Naming and integrity: Self-verifying data in peer-to-peer systems. In Proceedings of the Workshop on Future Directions in Distributed Computing (June 2002), pp. 142–147.
-
(2002)
Proceedings of the Workshop on Future Directions in Distributed Computing
, pp. 142-147
-
-
Weatherspoon, H.1
Wells, C.2
Kubiatowicz, J.3
|