Personensuche
X
?
Proceedings of the 26th ACM Symposium on Access Control Models and Technologies ,
3
Regulating Storage Overhead in Existing PoW-based Blockchai..:
, In:
?
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security ,
6
Sharing Proofs of Retrievability across Tenants:
, In:
?
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security ,
7
Transparent Data Deduplication in the Cloud:
, In:
?
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security ,
9
Outsourced Proofs of Retrievability:
, In:
?
Proceedings of the second ACM conference on Wireless network security ,
13
A ROM-friendly secure code update mechanism for WSNs using ..:
, In:
?
Proceedings of the second ACM conference on Wireless network security ,
14