Sciweavers

242 search results - page 12 / 49
» Cryptographic Cloud Storage
Sort
View
SIGOPS
2010
83views more  SIGOPS 2010»
13 years 5 months ago
Cloudifying source code repositories: how much does it cost?
—Cloud computing provides us with general purpose storage and server hosting platforms at a reasonable price. We explore the possibility of tapping these resources for the purpos...
Michael Siegenthaler, Hakim Weatherspoon
PPPJ
2003
ACM
14 years 19 days ago
A Java implemented key collision attack on the data encryption standard (DES)
A Java implementation of a key collision attack on DES suggested by Eli Biham, [1], is discussed. Storage space minimization and fast searching techniques to speed up the attack a...
John Loughran, Tom Dowling
STORAGESS
2005
ACM
14 years 29 days ago
Toward securing untrusted storage without public-key operations
Adding security capabilities to shared, remote and untrusted storage file systems leads to performance degradation that limits their use. Public-key cryptographic primitives, wid...
Dalit Naor, Amir Shenhav, Avishai Wool
SIGOPS
2010
95views more  SIGOPS 2010»
13 years 2 months ago
Toward automatic policy refinement in repair services for large distributed systems
In order to be economically feasible and to offer high levels of availability and performance, large scale distributed systems depend on the automation of repair services. While t...
Moisés Goldszmidt, Mihai Budiu, Yue Zhang, ...
FOCS
2005
IEEE
14 years 1 months ago
Cryptography In the Bounded Quantum-Storage Model
We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary’s quantum memory is of bounded size. We show that oblivious ...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...