Sciweavers

3451 search results - page 22 / 691
» Security of Backup Data
Sort
View
SP
2005
IEEE
15 years 3 months ago
Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data
Dwaine E. Clarke, G. Edward Suh, Blaise Gassend, A...
67
Voted
CCS
2010
ACM
14 years 10 months ago
Losing control of the internet: using the data plane to attack the control plane
Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune...
75
Voted
P2P
2002
IEEE
124views Communications» more  P2P 2002»
15 years 2 months ago
The Multi-Ring Topology - High-Performance Group Communication in Peer-to-Peer Networks
Emerging peer-to-peer applications require efficient group communication. However, current techniques for group communication are not optimal for peer-to-peer networks, which do n...
Markus Junginger, Yugyung Lee
HOTOS
2007
IEEE
15 years 1 months ago
Auditing to Keep Online Storage Services Honest
A growing number of online service providers offer to store customers' photos, email, file system backups, and other digital assets. Currently, customers cannot make informed...
Mehul A. Shah, Mary Baker, Jeffrey C. Mogul, Ram S...
SIGMOD
2012
ACM
278views Database» more  SIGMOD 2012»
13 years 3 days ago
Differential privacy in data publication and analysis
Data privacy has been an important research topic in the security, theory and database communities in the last few decades. However, many existing studies have restrictive assumpt...
Yin Yang, Zhenjie Zhang, Gerome Miklau, Marianne W...