5msRandomness ExtractorsRandomness extractors are functions that extract almost-uniform bits from sources of biased and correlated bits. The original motivation…Jul 9, 2017Jul 9, 2017
5msWeak Leakage-Resilient Client-side Deduplication of Encrypted Data in Cloud StorageJia Xu, Ee-Chien Chang, Jianying ZhouJul 8, 2017Jul 8, 2017
5msSecure Deduplication with Efficient and Reliable Convergent Key ManagementJin Li, Xiaofeng Chen, Mingqiang Li, Jingwei Li, Patrick P.C. Lee, and Wenjing LouJul 8, 2017Jul 8, 2017
5msClouDedup: Secure Deduplication with Encrypted Data for Cloud StoragePasquale Puzio, Refik Molva, Melek Onen, Sergio LoureiroJul 8, 2017Jul 8, 2017
5msCloud Storage Using Convergent Encryption TechniqueB. Seetharamul, Dr. G.V. UmaJul 8, 2017Jul 8, 2017
5msAn Analysis of Data Corruption in the Storage StackNearline disks develop checksum mismatches an order of magnitude more often than enterprise class disk drivesJul 3, 2017Jul 3, 2017
5msAn Analysis of Latent Sector Errors in Disk DrivesDisk scrubbing appears to be beneficial and can help reduce the mean time to data lossJul 3, 2017Jul 3, 2017
5msOn the Complexity of Crafting Crash-Consistent ApplicationsHow hard it is to save data without corruption or data lossJul 3, 2017Jul 3, 2017