Integrity and Performance in Network Attached Storage
暂无分享,去创建一个
[1] Katherine Yelick,et al. A Case for Intelligent RAM: IRAM , 1997 .
[2] Howard Gobioff,et al. Security for Network Attached Storage Devices , 1997 .
[3] Jim Zelenka,et al. File server scaling with network-attached secure disks , 1997, SIGMETRICS '97.
[4] Vincent Rijmen,et al. PRINCIPLES AND PERFORMANCE OF CRYPTOGRAPHIC ALGORITHMS , 1998 .
[5] Mihir Bellare,et al. XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions , 1995, CRYPTO.
[6] Eli Biham,et al. TIGER: A Fast New Hash Function , 1996, FSE.
[7] Jim Zelenka,et al. A cost-effective, high-bandwidth storage architecture , 1998, ASPLOS VIII.
[8] Christof Paar,et al. Fast DES Implementation for FPGAs and Its Application to a Universal Key-Search Machine , 1998, Selected Areas in Cryptography.
[9] Ralph Howard,et al. Data encryption standard , 1987 .
[10] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[11] Robert S. Fabry,et al. A fast file system for UNIX , 1984, TOCS.
[12] Bennet S. Yee,et al. Secure Coprocessors in Electronic Commerce Applications , 1995, USENIX Workshop on Electronic Commerce.
[13] Dawson R. Engler,et al. Server operating systems , 1996, EW 7.
[14] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.