Abstract is missing.
- Secure data deduplicationMark W. Storer, Kevin M. Greenan, Darrell D. E. Long, Ethan L. Miller. 1-10 [doi]
- When cryptography meets storageSarah M. Diesburg, Christopher R. Meyers, David M. Lary, An-I Andy Wang. 11-20 [doi]
- Tahoe: the least-authority filesystemZooko Wilcox-O Hearn, Brian Warner. 21-26 [doi]
- Improving secure long-term archival of digitally signed documentsCarmela Troncoso, Danny De Cock, Bart Preneel. 27-36 [doi]
- Testable commitmentsPhilippe Golle, Richard Chow, Jessica Staddon. 37-42 [doi]
- Efficient integrity checking of untrusted network storageAlexander Heitzmann, Bernardo Palazzi, Charalampos Papamanthou, Roberto Tamassia. 43-54 [doi]
- Configurable security for scavenged storage systemsAbdullah Gharaibeh, Samer Al-Kiswany, Matei Ripeanu. 55-62 [doi]
- Robust remote data checkingReza Curtmola, Osama Khan, Randal C. Burns. 63-68 [doi]