Data Retention and Anonymity Services, 2009. ,
DOI : 10.1007/978-3-540-30114-1_22
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, pp.93-118, 2001. ,
DOI : 10.1007/3-540-44987-6_7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.186.6534
What's new about cloud computing security? Tech. Rep, 2010. ,
Protecting free expression online with Freenet, IEEE Internet Computing, vol.6, issue.1, pp.40-49, 2002. ,
DOI : 10.1109/4236.978368
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.1501
Introducing traffic analysis In: Attacks, Defences and Public Policy Issues, 2007. ,
Tor: The second-generation onion router, Proceedings of the 13th USENIX Security Symposium, 2004. ,
Reclaiming space from duplicate files in a serverless distributed file system, Proceedings 22nd International Conference on Distributed Computing Systems, p.617, 2002. ,
DOI : 10.1109/ICDCS.2002.1022312
Dropbox -simplify your life, pp.2011-2016 ,
Cryptree: A Folder Tree Structure for Cryptographic File Systems, 2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06), pp.189-198, 2006. ,
DOI : 10.1109/SRDS.2006.15
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.67.8835
Side Channels in Cloud Services: Deduplication in Cloud Storage, IEEE Security & Privacy Magazine, vol.8, issue.6, pp.40-47, 2010. ,
DOI : 10.1109/MSP.2010.187
Cryptographic Cloud Storage, Lecture Notes in Computer Science, vol.6054, pp.136-149, 2010. ,
DOI : 10.1007/978-3-642-14992-4_13
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.159.4794
CS2: A semantic cryptographic cloud storage system, p.148632, 2011. ,
DOI : 10.1007/978-3-642-14992-4_13
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.159.4794
I know where you are and what you are sharing, Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, p.4039, 2011. ,
DOI : 10.1145/2068816.2068822
URL : https://hal.archives-ouvertes.fr/inria-00632780
Spying the world from your laptop ? identifying and profiling content providers and big downloaders in bittorrent, p.930, 2010. ,
URL : https://hal.archives-ouvertes.fr/inria-00470324
The NIST definition of cloud computing http ,
Bitcoin: A peer-to-peer electronic cash system, 2009. ,
Discover the prepaid solution for the internet : paysafecard.com, pp.2011-2022 ,
Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud Resources, Selected Areas in Cryptograph, 2011. ,
DOI : 10.1007/3-540-48071-4_3
Caught in the cloud: Privacy, encryption, and government back doors in the Web 2.0 era, Journal on Telecommunications and High Technology Law, vol.8, issue.2, pp.359-424, 2010. ,
Tarsnap -online backups for the truly paranoid, pp.2010-2015 ,
Public Law 107 -56 -Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act of, 2001. ,
Tahoe: the least-authority filesystem In: Proceedings of the 4th ACM International Workshop on Storage Security and Survivability (StorageSS '08), pp.21-26, 2008. ,
Wuala -secure online storage -backup. sync. share. access everywhere., https, pp.2011-2016 ,