Author of the publication

Provable data possession at untrusted stores.

, , , , , , and . ACM Conference on Computer and Communications Security, page 598-609. ACM, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Set Operations., and . CRYPTO, volume 3621 of Lecture Notes in Computer Science, page 241-257. Springer, (2005)Joint Solutions of Many Degrees-of-freedom Systems Using Dextrous Workspaces., , and . ICRA, page 2480-2485. IEEE, (2001)Provable data possession at untrusted stores., , , , , , and . ACM Conference on Computer and Communications Security, page 598-609. ACM, (2007)Remote data checking using provable data possession., , , , , , , and . ACM Trans. Inf. Syst. Secur., 14 (1): 12:1-12:34 (2011)Private Keyword-Based Push and Pull with Applications to Anonymous Communication., , , , and . ACNS, volume 3089 of Lecture Notes in Computer Science, page 16-30. Springer, (2004)Provably Secure Subsitution of Cryptographic Tools., and . IACR Cryptology ePrint Archive, (2006)Privacy engineering superheroes., and . Commun. ACM, 64 (11): 23-25 (2021)Zanzibar: Google's Consistent, Global Authorization System., , , , , , , , , and 4 other author(s). USENIX Annual Technical Conference, page 33-46. USENIX Association, (2019)