Author of the publication

FADE: Secure Overlay Cloud Storage with File Assured Deletion.

, , , and . SecureComm, volume 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 380-397. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Online Knapsack Problem with Departures., , , , , , and . SIGMETRICS (Abstracts), page 59-60. ACM, (2023)DiffForward: On Balancing Forwarding Traffic for Modern Cloud Block Services via Differentiated Forwarding., , , , , and . SIGMETRICS (Abstracts), page 11-12. ACM, (2023)Trading Discount for Reputation?: On the Design and Analysis of E-Commerce Discount Mechanisms., , and . SIGMETRICS, page 417-418. ACM, (2016)A Secure Cloud Backup System with Assured Deletion and Version Control., , , , and . ICPP Workshops, page 160-167. IEEE Computer Society, (2011)Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups., , and . ICNP, page 322-333. IEEE Computer Society, (2002)Keynote speakers: Big data science and social networks - Accelerating insights and building value., , and . ICCCN, page 1-3. IEEE, (2014)Performance Modeling on the Interaction of ISPs., , and . ICQT, volume 4033 of Lecture Notes in Computer Science, page 13-24. Springer, (2006)You Can Run, But You Can't Hide: An Effective Methodology to Traceback DDoS Attackers., , and . MASCOTS, page 433-. IEEE Computer Society, (2002)Entropy Based Flow Aggregation., , and . Networking, volume 3976 of Lecture Notes in Computer Science, page 1204-1209. Springer, (2006)Stochastic Differential Equation Approach to Model BitTorrent-like P2P Systems., , and . ICC, page 915-920. IEEE, (2006)