Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,621,091 papers from all fields of science
Search
Sign In
Create Free Account
Zeroisation
Known as:
Zeroize
, Zeroization
, Zeroise
Expand
In cryptography, zeroisation (also spelled zeroization) is the practice of erasing sensitive parameters (electronically stored data, cryptographic…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Compiler
Computer security
Critical Security Parameter
Cryptography
Expand
Broader (1)
Key management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Smart Data Back-up Technique for Cloud Computing using Secure Erasure Coding
Kolipaka Kiran
,
Janapati Venkata
,
Reddy Dist
,
Krishna
2014
Corpus ID: 212587165
— In cloud computing, data generated in electronic form are large in amount. To manage this data efficiently, there is an…
Expand
Review
2014
Review
2014
A Secure Erasure Code-based Cloud Storage System with Secure Data Forwarding : A Review
Ujwala Salunke
,
Dayanand Kendre
,
Gauri Gonjari
,
Dinesh Bhor
,
Minakshi N. Vharkate
2014
Corpus ID: 16027525
A collection of storage servers meant to be a cloud storage system which provides a long term storage services over the internet…
Expand
2013
2013
Secure erasure and repair of non-mechanical storage media
Paulo Dias
2013
Corpus ID: 86536784
2007
2007
ECO chip: Energy Consumption Zeroize Chip with a 953MHz High-Sensitivity Radio Wave Detector for Standby Mode Applications
T. Umeda
,
S. Otaka
IEEE Custom Integrated Circuits Conference
2007
Corpus ID: 14514534
ECO chip (energy consumption zeroize chip) for standby mode applications is presented. ECO chip detects 953 MHz band radio waves…
Expand
2006
2006
SEC : A Practical Secure Erasure Coding Scheme for Peer-to-Peer Storage System
Jing Tian
,
Zhi Yang
,
Yafei Dai
2006
Corpus ID: 16582299
Though conventional block cipher is widely used in Peer-to-Peer storage systems, it is insufficient to ensure the confidentiality…
Expand
2005
2005
An investigation into the efficiency of forensic erasure tools for hard disk mechanisms
C. Valli
,
Pauline Patak
Australian Computer, Network & Information…
2005
Corpus ID: 10657816
One of the common anecdotal complaints used when defending the insecure erasure of hard disks is the length of time taken to…
Expand
2004
2004
The Application of Zeroized Polynomial
Cai Jiong-hui
2004
Corpus ID: 123997342
Using matrix-zeroized polynomial, the formula for calculating standard fundamental solution matrix e At, is given. Appling…
Expand
2000
2000
Adaptively Secure Threshold Cryptography without the Assumption of Erasure
Stanislaw Jarecki
,
Anna Lysyanskaya
2000
Corpus ID: 142905
We exhibit eecient threshold cryptosystems which are secure against adaptive adversaries even when the players cannot erase their…
Expand
2000
2000
Reducing the distortion of the pseudo-inverse filter by the zeroize method
Wu Zhifang
2000
Corpus ID: 124503555
The inverse filter is a simple deconvolution algorithm which gives perfect performance when the raw data is noiseless, but is…
Expand
1997
1997
Parallelizing a Set of 2-d Frequency Transforms in a Flexible Abbreviated Title: Parallelizing 2-d Frequency Transforms
M. Fleury
,
A. Clark
1997
Corpus ID: 18337081
The implementation of parallel 2-D frequency transforms intended for the acceleration of image-processing algorithms is described…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required