Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
32
views
17
references
Top references
cited by
11
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,105
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Computer Security – ESORICS 2010
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
other
Author(s):
Daniele Perito
,
Gene Tsudik
Publication date
(Print):
2010
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Scientific Phone Apps and Mobile Devices
Most cited references
17
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Provable data possession at untrusted stores
Giuseppe Ateniese
,
Randal Burns
,
Reza Curtmola
…
(2007)
0
comments
Cited
104
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Pors
Burton Kaliski
,
Ari Juels
(2007)
0
comments
Cited
77
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Scalable and efficient provable data possession
Roberto Di Pietro
,
Giuseppe Ateniese
,
Luigi V. Mancini
…
(2008)
0
comments
Cited
66
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2010
Pages
: 643-662
DOI:
10.1007/978-3-642-15497-3_39
SO-VID:
dc6ec536-9d35-4da3-a261-b8767190b79a
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 373
On E-Vote Integrity in the Case of Malicious Voter Computers
pp. 455
User-Role Reachability Analysis of Evolving Administrative Role Based Access Control
pp. 134
Secure Multiparty Linear Programming Using Fixed-Point Arithmetic
pp. 151
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Σ-Protocols
pp. 199
Website Fingerprinting and Identification Using Ordered Feature Sequences
pp. 389
Election Verifiability in Electronic Voting Protocols
pp. 573
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks
pp. 643
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Similar content
1,105
Nonequilibrium information erasure below kTln2
Authors:
M. Konopík
,
A. Friedenberger
,
N Kiesel
…
Settler Colonialism in the Digital Age: Clash of Clans , Territoriality, and the Erasure of the Native
Authors:
Jacob Euteneuer
ACE: Anti-Editing Concept Erasure in Text-to-Image Models
Authors:
Zihao Wang
,
Yuxiang Wei
,
Fan Li
…
See all similar
Cited by
11
One-Time Computable Self-erasing Functions
Authors:
Stefan Dziembowski
,
Tomasz Kazana
,
Daniel Wichs
Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems
Authors:
Emil C. Lupu
,
Daniele Sgandurra
Proofs of Space: When Space Is of the Essence
Authors:
Giuseppe Ateniese
,
Ilario Bonacina
,
Antonio Faonio
…
See all cited by