Zachary N J Peterson
Zachary N J Peterson
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα calpoly.edu - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Provable data possession at untrusted stores
G Ateniese, R Burns, R Curtmola, J Herring, L Kissner, Z Peterson, ...
Proceedings of the 14th ACM conference on Computer and communications …, 2007
31982007
Remote data checking using provable data possession
G Ateniese, R Burns, R Curtmola, J Herring, O Khan, L Kissner, ...
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-34, 2011
4482011
Ext3cow: a time-shifting file system for regulatory compliance
Z Peterson, R Burns
ACM Transactions on Storage (TOS) 1 (2), 190-212, 2005
276*2005
Data placement for copy-on-write using virtual contiguity
ZNJ Peterson
University of California, Santa Cruz 2002., 2002
2392002
Securing electronic medical records using attribute-based encryption on mobile devices
JA Akinyele, MW Pagano, MD Green, CU Lehmann, ZNJ Peterson, ...
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
2312011
A position paper on data sovereignty: The importance of geolocating data in the cloud
ZNJ Peterson, M Gondree, R Beverly
1132011
Geolocation of data in the cloud
M Gondree, ZNJ Peterson
Proceedings of the third ACM conference on Data and application security and …, 2013
912013
Secure Deletion for a Versioning File System.
ZNJ Peterson, RC Burns, J Herring, A Stubblefield, AD Rubin
FAST 5 (2005), 2005
902005
Analysis of mutation and generation-based fuzzing
C Miller, ZNJ Peterson
Independent Security Evaluators, Tech. Rep 4, 2007
652007
Design and Implementation of Verifiable Audit Trails for a Versioning File System.
ZNJ Peterson, RC Burns, G Ateniese, S Bono
FAST 7, 20-20, 2007
482007
Security through play
M Gondree, ZNJ Peterson, T Denning
IEEE Security & Privacy 11 (3), 64-67, 2013
392013
Valuing security by getting [d0x3d!]: Experiences with a network security board game
M Gondree, ZNJ Peterson
6th Workshop on Cyber Security Experimentation and Test ({CSET} 13), 2013
322013
Zone-based shortest positioning time first scheduling for MEMS-based storage devices
B Hong, SA Brandt, DDE Long, EL Miller, KA Glocer, ZNJ Peterson
11th IEEE/ACM International Symposium on Modeling, Analysis and Simulation …, 2003
292003
The outcomes of cybersecurity competitions and implications for underrepresented populations
P Pusey, M Gondree, Z Peterson
IEEE Security & Privacy 14 (6), 90-95, 2016
282016
This is not a game: early observations on using alternate reality games for teaching security concepts to first-year undergraduates
T Flushman, M Gondree, ZNJ Peterson
8th Workshop on Cyber Security Experimentation and Test ({CSET} 15), 2015
282015
Method and apparatus for limiting access to sensitive data
ZNJ Peterson, AB Stubblefield, SC Bono, MD Green
US Patent 7,840,795, 2010
272010
DEFY: A deniable, encrypted file system for log-structured storage
TM Peters, MA Gondree, ZNJ Peterson
252015
Verifiable audit trails for a versioning file system
R Burns, Z Peterson, G Ateniese, S Bono
Proceedings of the 2005 ACM workshop on Storage security and survivability …, 2005
192005
Mixed approaches to cs0: Exploring topic and pedagogy variance after six years of cs0
ZJ Wood, J Clements, Z Peterson, D Janzen, H Smith, M Haungs, ...
Proceedings of the 49th ACM Technical Symposium on Computer Science …, 2018
142018
Talking about talking about cybersecurity games
M Gondree, ZNJ Peterson, P Pusey
login Usenix Mag. 41 (1), 2016
112016
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20