Login / Signup

Athos: Efficient Authentication of Outsourced File Systems.

Michael T. GoodrichCharalampos PapamanthouRoberto TamassiaNikos Triandopoulos
Published in: ISC (2008)
Keyphrases
  • file system
  • third party
  • access patterns
  • data transfer
  • user authentication