Global Sales Contact List

Contact   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

RSA Laboratories

Kevin Bowers

Full Publication List

Full Publication List:

Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea and Ronald L. Rivest. How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS 2011), To appear, October 2011. Full version available at: http://eprint.iacr.org/2010/214.

Jianqiang Luo, Kevin D. Bowers, Alina Oprea, and Lihao Xu. Efficient Implementations of Large Finite Fields GF(2n) for Secure Storage Applications.ACM Transactions on Storage. To appear.

2011

Tamara Denning, Kevin D. Bowers, Marten van Dijk, and Ari Juels. Exploring Implicit Memory for Painless Password Recovery. In Proceedings of the 2011 Annual Conference on Human Factors in Computing Systems (CHI '11), pages 2615-2618, May 2011.

2009

Kevin D. Bowers, Ari Juels, and Alina Oprea. HAIL: A High-Availability and Integrity Layer for Cloud Storage. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), pages 187-198, November 2009. Full version available at: http://eprint.iacr.org/2008/489.

Kevin D. Bowers, Ari Juels, and Alina Oprea. Proofs of Retrievability: Theory and Implementation. In Proceedings of the ACM Cloud Computing Security Workshop (CCSW 2009), pages 43-53, November 2009. Full version available at: http://eprint.iacr.org/2008/175.

Alina Oprea and Kevin D. Bowers. Authentic Time-Stamps for Archival Storage. In Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 2009). Full version available at http://eprint.iacr.org/2009/306.

2007

Kevin D. Bowers, Lujo Bauer, Deepak Garg, Frank Pfenning, and Michael K. Reiter. Consumable Credentials in Logic-Based Access-Control Systems. In Proceedings of the 2007 Network and Distributed Systems Security Symposium, pages 143-157, February 2007.

2006

Deepak Garg, Lujo Bauer, Kevin D. Bowers, Frank Pfenning, and Michael K. Reiter. A Linear Logic of Authorization and Knowledge. In Computer Security - ESORICS 2006: 11th European Symposium on Research in Computer Security, volume 4189 of Lecture Notes in Computer Science, pages 297-312, September 2006.

2004

Jeremiah J. Harmsen, Kevin D. Bowers, and William A. Pearlman. Fast Additive Noise Steganalysis. In Proceedings of the SPIE International Society for Optical Engineering, volume 5306 - Security, Steganography, and Watermarking of Multimedia Contents VI, pages 489-495, January 2004.

2003

Kevin D. Bowers, Kevin Mills, and Scott Rose. Self-adaptive Leasing for Jini. In Pervasive Computing and Communications, 2003 (PerCom '03): Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, pages 539-542. March 2003.


Top of Page

Notes:
Connect with EMCConnect with EMC
Need help immediately? EMC Sales Specialists are standing by to answer your questions real time.
Use Live Chat for fast, direct access to EMC Customer Service Professionals to resolve your support questions.
Explore and compare EMC products in the EMC Store, and get a price quote from EMC or an EMC partner.
We're here to help. Send us your sales inquiry and an EMC Sales Specialist will get back to you within one business day.
Want to talk? Call us to speak with an EMC Sales Specialist live.