Eliminating counterevidence with applications to accountable certificate management
Journal of Computer Security
Secure History Preservation Through Timeline Entanglement
Proceedings of the 11th USENIX Security Symposium
A Framework for Evaluating Storage System Security
FAST '02 Proceedings of the 1st USENIX Conference on File and Storage Technologies
Verifiable audit trails for a versioning file system
Proceedings of the 2005 ACM workshop on Storage security and survivability
Trust but verify: accountability for network services
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Strong accountability for network storage
ACM Transactions on Storage (TOS)
Improving secure long-term archival of digitally signed documents
Proceedings of the 4th ACM international workshop on Storage security and survivability
Efficient integrity checking of untrusted network storage
Proceedings of the 4th ACM international workshop on Storage security and survivability
Long-term data resilience using opinion polls
Long-term data resilience using opinion polls
A comprehensive reference architecture for trustworthy long-term archiving of sensitive data
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Naming and integrity: self-verifying data in peer-to-peer systems
Future directions in distributed computing
Authentic time-stamps for archival storage
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
A framework for evaluating storage system security
FAST'02 Proceedings of the 1st USENIX conference on File and storage technologies
The role of accountability in dependable distributed systems
HotDep'05 Proceedings of the First conference on Hot topics in system dependability
Verified query results from hybrid authentication trees
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Hi-index | 0.01 |