Conference paper
Multicast security: A taxonomy and some efficient constructions
Ran Canetti, Juan Garay, et al.
IEEE INFOCOM 1991
Although deduplication is most effective when applied across multiple users, cross-user deduplication has serious privacy implications. Some simple mechanisms can enable cross-user deduplication while greatly reducing the risk of data leakage. © 2006 IEEE.
Ran Canetti, Juan Garay, et al.
IEEE INFOCOM 1991
Michael Factor, David Hadas, et al.
MSST 2013
Moshik Lanir Hershcovitch, Andrew Wood, et al.
CLOUD 2025
Danny Harnik, Ety Khaitzin, et al.
DCC 2014