On protecting integrity and confidentiality of cryptographic file system for outsourced storageJan 1, 2009ยทAaram Yun,Chunhui Shi,Yongdae Kimยท 0 min read DOILast updated on Jan 1, 2009 AuthorsAaram YunAuthorsChunhui ShiAuthorsYongdae Kim← Membership-concealing overlay networks Jan 1, 2009Scalable onion routing with torsk Jan 1, 2009 →