Login / Signup
Secure RAID schemes from EVENODD and STAR codes.
Wentao Huang
Jehoshua Bruck
Published in:
ISIT (2017)
Keyphrases
</>
reed solomon
key management scheme
provably secure
public key encryption
security requirements
security issues
key management
covert channel
cryptographic algorithms
data sets
data encryption
identity management
star shaped
user authentication
security model
security mechanisms
database systems
information systems