Proceedings of Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization, pp.111-116, 2010. ,
A Practical Guide To Trusted Computing, pp.17-18, 2009. ,
Trusted Computing Platforms, pp.166-167, 2009. ,
Ensuring data storage security in Cloud Computing, 2009 17th International Workshop on Quality of Service, 2009. ,
DOI : 10.1109/IWQoS.2009.5201385
Scalable and efficient provable data possession, Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm '08, 2008. ,
DOI : 10.1145/1460877.1460889
Cyptography and Network Security Principles and Practices, Fourth Edition, pp.59-60, 2006. ,
Cloud security is not (just) virtualization security, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, 2009. ,
DOI : 10.1145/1655008.1655022
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.625.8837
Mapreduce: Simplied data processing on large clusters, Proc. OSDI, 2004. ,
PeerReview:Practical Accountability for Distributed Systems, Proc. SOSP, 2007. ,
On Technical Security Issues in Cloud Computing, 2009 IEEE International Conference on Cloud Computing, 2009. ,
DOI : 10.1109/CLOUD.2009.60