Login / Signup
CRUST: Cryptographic Remote Untrusted Storage without Public Keys.
Erel Geron
Avishai Wool
Published in:
IACR Cryptol. ePrint Arch. (2007)
Keyphrases
</>
hash functions
remote server
data storage
storage and retrieval
real time
smart card
third party
file system
storage requirements
network communication
privacy preserving
secret key
security protocols
tcp ip
encrypted data
sensitive data
security policies
storage devices