Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
31
views
17
references
Top references
cited by
11
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,230
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Computer Security – ESORICS 2010
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
other
Author(s):
Daniele Perito
,
Gene Tsudik
Publication date
(Print):
2010
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Scientific Phone Apps and Mobile Devices
Most cited references
17
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Provable data possession at untrusted stores
Giuseppe Ateniese
,
Randal Burns
,
Reza Curtmola
…
(2007)
0
comments
Cited
104
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Pors
Burton Kaliski
,
Ari Juels
(2007)
0
comments
Cited
77
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Scalable and efficient provable data possession
Roberto Di Pietro
,
Giuseppe Ateniese
,
Luigi V. Mancini
…
(2008)
0
comments
Cited
66
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2010
Pages
: 643-662
DOI:
10.1007/978-3-642-15497-3_39
SO-VID:
dc6ec536-9d35-4da3-a261-b8767190b79a
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 373
On E-Vote Integrity in the Case of Malicious Voter Computers
pp. 455
User-Role Reachability Analysis of Evolving Administrative Role Based Access Control
pp. 134
Secure Multiparty Linear Programming Using Fixed-Point Arithmetic
pp. 151
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Σ-Protocols
pp. 199
Website Fingerprinting and Identification Using Ordered Feature Sequences
pp. 389
Election Verifiability in Electronic Voting Protocols
pp. 573
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks
pp. 643
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Similar content
1,230
Nonequilibrium information erasure below kTln2
Authors:
M. Konopík
,
A. Friedenberger
,
N Kiesel
…
Generalized and Doubly Generalized LDPC Codes With Random Component Codes for the Binary Erasure Channel
Authors:
Enrico Paolini
,
Marc Fossorier
,
Marco Chiani
The Right to Erasure in EU Data Protection Law
Authors:
Jef Ausloos
See all similar
Cited by
11
One-Time Computable Self-erasing Functions
Authors:
Stefan Dziembowski
,
Tomasz Kazana
,
Daniel Wichs
Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems
Authors:
Emil C. Lupu
,
Daniele Sgandurra
Proofs of Space: When Space Is of the Essence
Authors:
Giuseppe Ateniese
,
Ilario Bonacina
,
Antonio Faonio
…
See all cited by