How to recover a cryptographic secret from the cloud

D Adei, C Orsini, A Scafuro, T Verber - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Clouds have replaced most local backup systems as they offer strong availability and
reliability guarantees. Clouds, however, are not (and should not be) used as backup for …

Investment risk early warning method of listed companies based on EMD-RF-LSTM

L Ren, W Zhang - International Journal of Sustainable …, 2024 - inderscienceonline.com
In order to overcome the problems of low accuracy and poor correlation in the early warning
method of investment risk of listed companies, this paper designs an early warning method …

Secure Keyless Multi-Party Storage Scheme

P Lafourcade, LB Mallordy, C Olivier-Anclin, L Robert - ESORICS, 2024 - hal.science
Using threshold secret sharing, we propose a solution tai-lored for forgetful clients (ie, not
required to keep any cryptographic secret) while accommodating the dynamic nature of multi …

Dynamic verification of data integrity on cloud based on chameleon hash algorithm

D Han, M Lee, D Wang, B Meng - … International Conference on …, 2024 - spiedigitallibrary.org
With the rapid development of cloud storage technology, ensuring the integrity of data on
cloud remains a significant challenge. This paper introduces an blockchain-based …

[PDF][PDF] Secure Keyless Multi-Party Storage Scheme

L Robert - sancy.iut.uca.fr
Using threshold secret sharing, we propose a solution tailored for forgetful clients (ie, not
required to keep any cryptographic secret) while accommodating the dynamic nature of multi …

[引用][C] Verteilte Datenvalidierungsnetzwerke im industriellen Umfeld

K Wallis - 2023 - Dissertation, Universität Freiburg …