2014
DOI: 10.1007/978-3-319-10879-7_30
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Proofs of Secure Erasure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…For doctors, eHealth may allow them to prioritize differently and tend to patients who cannot travel. Others have highlighted the possibility of using eHealth services to reduce health care costs [ 32 ].…”
Section: Methodsmentioning
confidence: 99%
“…For doctors, eHealth may allow them to prioritize differently and tend to patients who cannot travel. Others have highlighted the possibility of using eHealth services to reduce health care costs [ 32 ].…”
Section: Methodsmentioning
confidence: 99%
“…Alternatively, several platforms allow the prover to convince that the prover has access to some storage space [3, 12,22,33,39,45,51,64,67]. Additionally one can require that the proof implies that the space also was erased [51,67], or some function can only be computed in forward direction [33].…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, these timestamps can be verified whenever the corresponding block is published on the main chain. The work in [23] presents a graph pebbling technique to ensure the data erasure in a bounded-space. Caching vs retention.…”
Section: Related Workmentioning
confidence: 99%