Sciweavers

242 search results - page 19 / 49
» Cryptographic Cloud Storage
Sort
View
ICNS
2008
IEEE
14 years 2 months ago
Reliable Evidence of Data Integrity from an Untrusted Storage Service
Digital storage demand is growing with the increasing use of digital artifacts from media files to business documents. Regulatory frameworks ask for unaltered, durable storage of...
Claudius Stern, Philipp Adelt, Volker Krummel, Mar...
DATE
2006
IEEE
95views Hardware» more  DATE 2006»
14 years 5 days ago
Satisfiability-based framework for enabling side-channel attacks on cryptographic software
- Many electronic systems contain implementations of cryptographic algorithms in order to provide security. It is well known that cryptographic algorithms, irrespective of their th...
Nachiketh R. Potlapally, Anand Raghunathan, Srivat...
ASPLOS
2000
ACM
14 years 26 days ago
OceanStore: An Architecture for Global-Scale Persistent Storage
OceanStore is a utility infrastructure designed to span the globe and provide continuous access to persistent information. Since this infrastructure is comprised of untrusted serv...
John Kubiatowicz, David Bindel, Yan Chen, Steven E...
TIT
2008
111views more  TIT 2008»
13 years 8 months ago
The Bounded-Storage Model in the Presence of a Quantum Adversary
An extractor is a function that is used to extract randomness. Given an imperfect random source X and a uniform seed Y , the output (X; Y ) is close to uniform. We study properties...
Robert T. König, Barbara M. Terhal
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
14 years 2 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic