Posted on
in Presentations
Methods for securely outsourcing storage are discussed. Topic 1: Composable and Robust Outsourced Storage Authors: Christian Badertscher; Ueli Maurer Topic 2: Secure Deduplication of Encrypted Data: Refined Model and New Constructions Authors: Jian Liu; Li Duan; Yong Li; N. Asokan
Protecting Data & Applied Crypto
cryptography
Topic
Protecting Data & Applied Crypto
Subtopic
cryptography
Share With Your Community