Sciweavers

1744 search results - page 36 / 349
» The Steganographic File System
Sort
View
129
Voted
WETICE
1998
IEEE
15 years 7 months ago
User Controlled Sharing in a Variable Connected Distributed System
This paper describes the design and implementation of a distributed file repository that supports data sharing in a variable connected environment. Our design is based on the obse...
Tage Stabell-Kulø, Terje Fallmyr
HICSS
2009
IEEE
119views Biometrics» more  HICSS 2009»
15 years 10 months ago
Using Graphics Processors for Parallelizing Hash-Based Data Carving
The ability to detect fragments of deleted image files and to reconstruct these image files from all available fragments on disk is a key activity in the field of digital forensic...
Sylvain Collange, Yoginder S. Dandass, Marc Daumas...
142
Voted
WPES
2006
ACM
15 years 9 months ago
Nonesuch: a mix network with sender unobservability
Oblivious submission to anonymity systems is a process by which a message may be submitted in such a way that neither the anonymity network nor a global passive adversary may dete...
Thomas S. Heydt-Benjamin, Andrei Serjantov, Beness...
EUROPAR
2008
Springer
15 years 5 months ago
Efficient Management of Complex Striped Files in Active Storage
Abstract. Active Storage provides an opportunity for reducing the bandwidth requirements between the storage and compute elements of current supercomputing systems, and leveraging ...
Juan Piernas, Jarek Nieplocha
81
Voted
SIGOPSE
1990
ACM
15 years 7 months ago
Specifying data availability in multi-device file systems
John Wilkes, Raymie Stata