×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [untrusted server]
A privacy preserving-location_monitoring_system_for_wireless_sensor_networks
1.130 views
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
1.209 views
2. efficient audit service outsourcing for data integrity in clouds
490 views
Oruta project report
238 views
Oruta-Privacy Preserving Public Auditing
5 views
A Secure Processor Architecture for Encrypted Computation on Untrusted Programs.pdf
256 views
SPORC: Group Collaboration using Untrusted Cloud Resources Ariel J. Feldman, William P. Zeller, Michael J. Freedman, Edward W. Felten Published in OSDI’2010
215 views
Query Execution Assurance for Outsourced Databases 1.31 - 08/29/05 prepared for VLDB 2005 Radu Sion (
[email protected]
) sion
217 views
Negotiated Privacy CS551/851CRyptographyApplicationsBistro Mike McNett 30 March 2004 Stanislaw Jarecki, Pat Lincoln, Vitaly Shmatikov. Negotiated Privacy.Negotiated
217 views
1 Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions Reza Curtmola Juan Garay Seny Kamara Rafail Ostrovsky Johns Hopkins
221 views
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR
22 views
SPORC: Group Collaboration using Untrusted Cloud Resources OSDI 2010 Presented by Yu Chen
230 views