Posted on
in Presentations
Methods for securely outsourcing storage are discussed.
Topic 1: Composable and Robust Outsourced Storage
Authors: Christian Badertscher; Ueli Maurer
Topic 2: Secure Deduplication of Encrypted Data: Refined Model and New Constructions
Authors: Jian Liu; Li Duan; Yong Li; N. Asokan
Share With Your Community