Posted on
in Presentations
Methods for securely outsourcing storage are discussed.
Topic 1: Composable and Robust Outsourced Storage
Authors: Christian Badertscher; Ueli Maurer
Topic 2: Secure Deduplication of Encrypted Data: Refined Model and New Constructions
Authors: Jian Liu; Li Duan; Yong Li; N. Asokan
Access this and other Conference presentations with your free RSAC™ Membership. Your Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with peers and experts, and more.
Share With Your Community