Publisher
Springer Berlin Heidelberg
Reference4 articles.
1. Bacis E, De Capitani di Vimercati S, Foresti S, Paraboschi S, Rosa M, Samarati P (2016) Mix&Slice: efficient access revocation in the cloud. In: Proceedings of the 23rd ACM Conference on Computer and Communication Security (CCS 2016), ACM. https://doi.org/10.1145/2976749.2978377
2. Bacis E, De Capitani di Vimercati S, Foresti S, Paraboschi S, Rosa M, Samarati P (2020) Securing resources in decentralized cloud storage. IEEE Trans Inf Forensics Secur (TIFS) 15(1):286–298
3. Fu K, Kamara S, Kohno Y (2006) Key regression: enabling efficient key distribution for secure distributed storage. In: Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego
4. Rivest RL (1997) All-or-nothing encryption and the package transform. In: Proceedings of the 4th International Workshop on Fast Software Encryption (FSE ’97), LNCS, vol 1267. Springer, pp 210–218