Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference38 articles.
1. Abadi M, Boneh D, Mironov I, Raghunathan A, Segev G (2013) Message-locked encryption for lock-dependent messages. In: Advances in Cryptology–CRYPTO 2013, Springer, pp 374–391, https://doi.org/10.1007/978-3-642-40041-4_21
2. Akinyele JA, Garman C, Miers I, Pagano MW, Rushanan M, Green M, Rubin AD (2013) Charm: a framework for rapidly prototyping cryptosystems. Journal of Cryptographic Engineering 3(2):111–128. https://doi.org/10.1007/s13389-013-0057-3
3. Bellare M, Keelveedhi S, Ristenpart T (2013a) Dupless: server-aided encryption for deduplicated storage. In: Proceedings of the 22nd USENIX conference on Security, USENIX Association, pp 179–194
4. Bellare M, Keelveedhi S, Ristenpart T (2013b ) Message-locked encryption and secure deduplication. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp 296–312. https://doi.org/10.1007/978-3-642-38348-9_18
5. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: Security and Privacy, 2007. SP’07. IEEE Symposium on, IEEE, pp 321–334. https://doi.org/10.1109/SP.2007.11
Cited by
33 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献