Download pdf
Methods for securely outsourcing storage are discussed. Topic 1: Composable and Robust Outsourced Storage Authors: Christian Badertscher; Ueli Maurer Topic 2: Secure Deduplication of Encrypted Data: Refined Model and New Constructions Authors: Jian Liu; Li Duan; Yong Li; N. Asokan