Author of the publication

A Secure Cloud Backup System with Assured Deletion and Version Control.

, , , , and . ICPP Workshops, page 160-167. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems., , and . DIMVA, volume 7591 of Lecture Notes in Computer Science, page 82-101. Springer, (2012)Rack-Aware Regenerating Codes for Data Centers., , , and . IEEE Trans. Inf. Theory, 65 (8): 4730-4745 (2019)Cross-Rack-Aware Single Failure Recovery for Clustered File Systems., , , and . IEEE Trans. Dependable Secur. Comput., 17 (2): 248-261 (2020)A New Construction of EVENODD Codes With Lower Computational Complexity., and . IEEE Communications Letters, 22 (6): 1120-1123 (2018)A Weighted Crowdsourcing Approach for Network Quality Measurement in Cellular Data Networks., , , , , , , and . IEEE Trans. Mob. Comput., 16 (2): 300-313 (2017)FADE: Secure Overlay Cloud Storage with File Assured Deletion., , , and . SecureComm, volume 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 380-397. Springer, (2010)Triple-fault-tolerant binary MDS array codes with asymptotically optimal repair., , , and . ISIT, page 839-843. IEEE, (2017)Opportunistic use of client repeaters to improve performance of WLANs., , , , , , and . CoNEXT, page 29. ACM, (2008)LD-Sketch: A distributed sketching design for accurate and scalable anomaly detection in network data streams., and . INFOCOM, page 1420-1428. IEEE, (2014)Toward Optimal Network Fault Correction via End-to-End Inference., , and . INFOCOM, page 1343-1351. IEEE, (2007)