Amanote Research

Amanote Research

    RegisterSign In

CRUST: Cryptographic Remote Untrusted Storage Without Public Keys

International Journal of Information Security - Germany
doi 10.1007/s10207-009-0081-6
Full Text
Open PDF
Abstract

Available in full text

Categories
Information SystemsRiskComputer NetworksCommunicationsReliabilitySafetyQualitySoftware
Date

June 5, 2009

Authors
Erel GeronAvishai Wool
Publisher

Springer Science and Business Media LLC


Related search

Modelling Cryptographic Keys in Dynamic Epistemic Logic With DEMO

Highlights on Practical Applications of Agents and Multi-Agent Systems
2012English

Experimental Quantum-Enhanced Cryptographic Remote Control

Scientific Reports
Multidisciplinary
2019English

Providing Higher Entropy Cryptographic Keys by the Use of Biometrics

2010English

Towards Self-Repairing Replication-Based Storage Systems Using Untrusted Clouds

2013English

Cryptographic Solutions for Cloud-Based Storage System

International Journal of Recent Technology and Engineering
EngineeringManagement of TechnologyInnovation
2019English

One Implementation of a Protocol for Generation and Distribution of Cryptographic Keys

2018English

Multi-Cloud Secure Data Storage Using Cryptographic Techniques

International Journal of Research in Advent Technology
2019English

The Generation of Shared Cryptographic Keys Through Channel Impulse Response Estimation at 60 GHz.

2010English

Secrecy in Untrusted Networks

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2003English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy