Methods for securely outsourcing storage are discussed.
Topic 1: Composable and Robust Outsourced Storage Authors: Christian Badertscher; Ueli Maurer
Topic 2: Secure Deduplication of Encrypted Data: Refined Model and New Constructions Authors: Jian Liu