• Ratliff Z, Goh W, Wieland A, Mickens J and Williams R. (2024). Holepunch: Fast, Secure File Deletion with Crash Consistency 2024 IEEE Symposium on Security and Privacy (SP). 10.1109/SP54263.2024.00237. 979-8-3503-3130-1. (2705-2721).

    https://ieeexplore.ieee.org/document/10646784/

  • Ren Z, Li X, Wang L, Xu S, Tong Y and Tang J. (2021). Minimal key set of binary key-derivation tree in cloud storage. Soft Computing. 10.1007/s00500-021-06065-w. 27:2. (1177-1188). Online publication date: 1-Jan-2023.

    https://link.springer.com/10.1007/s00500-021-06065-w

  • Yang L, Li C, Wei T, Zhang F, Ma J and Xiong N. Vacuum: Efficient and Assured Deletion Scheme for User Sensitive Data on Mobile Devices. IEEE Internet of Things Journal. 10.1109/JIOT.2021.3119514. 9:12. (10093-10107).

    https://ieeexplore.ieee.org/document/9569735/

  • Bienstock A, Dodis Y and Tang Y. (2022). Multicast Key Agreement, Revisited. Topics in Cryptology – CT-RSA 2022. 10.1007/978-3-030-95312-6_1. (1-25).

    https://link.springer.com/10.1007/978-3-030-95312-6_1

  • Wani M. (2021). Privacy Preserving Anti-forensic Techniques. Multimedia Security. 10.1007/978-981-15-8711-5_5. (89-108).

    http://link.springer.com/10.1007/978-981-15-8711-5_5

  • Bienstock A, Dodis Y and Yeo K. (2021). Forward Secret Encrypted RAM: Lower Bounds and Applications. Theory of Cryptography. 10.1007/978-3-030-90456-2_3. (62-93).

    https://link.springer.com/10.1007/978-3-030-90456-2_3

  • Meng W, Ge J and Jiang T. (2019). Secure Data Deduplication with Reliable Data Deletion in Cloud. International Journal of Foundations of Computer Science. 10.1142/S0129054119400124. 30:04. (551-570). Online publication date: 1-Jun-2019.

    https://www.worldscientific.com/doi/abs/10.1142/S0129054119400124

  • Karim Y, Satvat K, Hosseini M and Hasan R. (2019). PurgeMEM: Towards Building A Memory Safe Cloud SoutheastCon 2019. 10.1109/SoutheastCon42311.2019.9020635. 978-1-7281-0137-8. (1-8).

    https://ieeexplore.ieee.org/document/9020635/

  • Zhang Q, Jia S, Chang B and Chen B. (2018). Ensuring data confidentiality via plausibly deniable encryption and secure deletion – a survey. Cybersecurity. 10.1186/s42400-018-0005-8. 1:1. Online publication date: 1-Dec-2018.

    https://cybersecurity.springeropen.com/articles/10.1186/s42400-018-0005-8

  • Onarlioglu K, Robertson W and Kirda E. (2018). Eraser: Your Data Won't Be Back 2018 IEEE European Symposium on Security and Privacy (EuroS&P). 10.1109/EuroSP.2018.00019. 978-1-5386-4228-3. (153-166).

    https://ieeexplore.ieee.org/document/8406597/

  • Yang C, Chen X and Xiang Y. (2018). Blockchain-based publicly verifiable data deletion scheme for cloud storage. Journal of Network and Computer Applications. 103:C. (185-193). Online publication date: 1-Feb-2018.

    https://doi.org/10.1016/j.jnca.2017.11.011

  • Xue L, Ni J, Li Y and Shen J. (2017). Provable data transfer from provable data possession and deletion in cloud storage. Computer Standards & Interfaces. 54:P1. (46-54). Online publication date: 1-Nov-2017.

    https://doi.org/10.1016/j.csi.2016.08.006

  • Li Q and Jiang A. (2017). Coding for Secure Write-Efficient Memories. IEEE Transactions on Information Theory. 63:2. (1130-1145). Online publication date: 1-Feb-2017.

    https://doi.org/10.1109/TIT.2016.2634553

  • Yao W, Chen Y and Wang D. (2017). Cloud Multimedia Files Assured Deletion Based on Bit Stream Transformation with Chaos Sequence. Algorithms and Architectures for Parallel Processing. 10.1007/978-3-319-65482-9_31. (441-451).

    http://link.springer.com/10.1007/978-3-319-65482-9_31

  • Diesburg S, Feldhaus C, Fardan M, Schlicht J and Ploof N. Is your data gone?. Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust. (47-59).

    https://doi.org/10.1145/3046055.3046057

  • Hao F, Clarke D and Zorzo A. (2016). Deleting Secret Data with Public Verifiability. IEEE Transactions on Dependable and Secure Computing. 13:6. (617-629). Online publication date: 1-Nov-2016.

    https://doi.org/10.1109/TDSC.2015.2423684

  • Ramokapane K, Rashid A and Such J. Assured Deletion in the Cloud. Proceedings of the 2016 ACM on Cloud Computing Security Workshop. (97-108).

    https://doi.org/10.1145/2996429.2996434

  • Camenisch J, Enderlein R and Maurer U. Memory Erasability Amplification. Proceedings of the 10th International Conference on Security and Cryptography for Networks - Volume 9841. (104-125).

    https://doi.org/10.1007/978-3-319-44618-9_6

  • Diesburg S, Meyers C, Stanovich M, Wang A and Kuenning G. (2016). TrueErase. ACM Transactions on Storage. 12:4. (1-37). Online publication date: 29-Aug-2016.

    https://doi.org/10.1145/2854882

  • Ni J, Lin X, Zhang K, Yu Y and Shen X. (2016). Device-invisible two-factor authenticated key agreement protocol for BYOD 2016 IEEE/CIC International Conference on Communications in China (ICCC). 10.1109/ICCChina.2016.7636868. 978-1-5090-2143-7. (1-6).

    http://ieeexplore.ieee.org/document/7636868/

  • Ni J, Lin X, Zhang K, Yu Y and Shen X. (2016). Secure outsourced data transfer with integrity verification in cloud storage 2016 IEEE/CIC International Conference on Communications in China (ICCC). 10.1109/ICCChina.2016.7636866. 978-1-5090-2143-7. (1-6).

    http://ieeexplore.ieee.org/document/7636866/

  • Narkhede V, Joshi K, Aviv A, Choi S, Roche D and Finin T. (2016). Managing Cloud Storage Obliviously 2016 IEEE 9th International Conference on Cloud Computing (CLOUD). 10.1109/CLOUD.2016.0151. 978-1-5090-2619-7. (990-993).

    http://ieeexplore.ieee.org/document/7820388/

  • Roche D, Aviv A and Choi S. (2016). A Practical Oblivious Map Data Structure with Secure Deletion and History Independence 2016 IEEE Symposium on Security and Privacy (SP). 10.1109/SP.2016.19. 978-1-5090-0824-7. (178-197).

    http://ieeexplore.ieee.org/document/7546502/

  • Xiong J, Li F, Ma J, Liu X, Yao Z and Chen P. (2014). A full lifecycle privacy protection scheme for sensitive data in cloud computing. Peer-to-Peer Networking and Applications. 10.1007/s12083-014-0295-x. 8:6. (1025-1037). Online publication date: 1-Nov-2015.

    http://link.springer.com/10.1007/s12083-014-0295-x

  • Karame G and Li W. (2015). Secure Erasure and Code Update in Legacy Sensors. Trust and Trustworthy Computing. 10.1007/978-3-319-22846-4_17. (283-299).

    https://link.springer.com/10.1007/978-3-319-22846-4_17

  • Ritzdorf H, Karapanos N and Čapkun S. Assisted deletion of related content. Proceedings of the 30th Annual Computer Security Applications Conference. (206-215).

    https://doi.org/10.1145/2664243.2664287

  • Xiong J, Liu X, Yao Z, Ma J, Li Q, Geng K and Chen P. A Secure Data Self-Destructing Scheme in Cloud Computing. IEEE Transactions on Cloud Computing. 10.1109/TCC.2014.2372758. 2:4. (448-458).

    http://ieeexplore.ieee.org/document/6963363/

  • Fu Z, Cao X, Wang J and Sun X. Secure Storage of Data in Cloud Computing. Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. (783-786).

    https://doi.org/10.1109/IIH-MSP.2014.199

  • Naveed M. Hurdles for Genomic Data Usage Management. Proceedings of the 2014 IEEE Security and Privacy Workshops. (44-48).

    https://doi.org/10.1109/SPW.2014.44