1. Message locked encryption for lock-dependent messages;Abadi,2013
2. A five-year study of file-system metadata;Agrawal,2007
3. Fast and secure laptop backups with encrypted de-duplication;Anderson,2010
4. Why information security is hard – An economic perspective;Anderson,2001
5. Provable data possession at untrusted stores;Ateniese,2007