Threshold estimation in self-destructing scheme using regression analysis
暂无分享,去创建一个
[1] John Kubiatowicz,et al. Handling churn in a DHT , 2004 .
[2] Amit A. Levy,et al. Vanish: Increasing Data Privacy with Self-Destructing Data , 2009, USENIX Security Symposium.
[3] G. Golub,et al. Separable nonlinear least squares: the variable projection method and its applications , 2003 .
[4] D RyanMark. Cloud computing privacy concerns on our doorstep , 2011 .
[5] Mark Ryan,et al. Cloud computing privacy concerns on our doorstep , 2011, Commun. ACM.
[6] Adi Shamir,et al. How to share a secret , 1979, CACM.
[7] Qin Liu,et al. A Secure Self-Destructing Scheme for Electronic Data , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[8] Guillermo Sapiro,et al. A Gromov-Hausdorff Framework with Diffusion Geometry for Topologically-Robust Non-rigid Shape Matching , 2010, International Journal of Computer Vision.