Decentralized recovery for survivable storage systems
暂无分享,去创建一个
[1] Antony I. T. Rowstron,et al. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility , 2001, SOSP.
[2] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[3] Ian F. Blake,et al. Elliptic Curves in Cryptography: Preface , 1999 .
[4] Silvio Micali,et al. Verifiable Secret Sharing as Secure Computation , 1994, EUROCRYPT.
[5] Adi Shamir,et al. How to share a secret , 1979, CACM.
[6] Moti Yung,et al. Adaptive Security for the Additive-Sharing Based Proactive RSA , 2001, Public Key Cryptography.
[7] William M. Daley,et al. Digital Signature Standard (DSS) , 2000 .
[8] Alfredo De Santis,et al. Fully Dynamic Secret Sharing Schemes , 1993, Theor. Comput. Sci..
[9] Ernest F. Brickell,et al. Fast Exponentiation with Precomputation (Extended Abstract) , 1992, EUROCRYPT.
[10] Marek Karpinski,et al. An XOR-based erasure-resilient coding scheme , 1995 .
[11] Moti Yung,et al. Adaptively-Secure Optimal-Resilience Proactive RSA , 1999, ASIACRYPT.
[12] R. Anderson. The Eternity Service , 1996 .
[13] Tal Rabin,et al. Secure distributed storage and retrieval , 1997, Theor. Comput. Sci..
[14] Andrew V. Goldberg,et al. Towards an archival Intermemory , 1998, Proceedings IEEE International Forum on Research and Technology Advances in Digital Libraries -ADL'98-.
[15] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[16] Tal Rabin,et al. Robust sharing of secrets when the dealer is honest or cheating , 1994, JACM.
[17] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[18] Tal Rabin,et al. A Simplified Approach to Threshold and Proactive RSA , 1998, CRYPTO.
[19] Noga Alon,et al. Scalable Secure Storage when Half the System Is Faulty , 2000, ICALP.
[20] Arif Merchant,et al. FAB: Enterprise Storage Systems on a Shoestring , 2003, HotOS.
[21] Madhu Sudan,et al. Highly Resilient Correctors for Polynomials , 1992, Inf. Process. Lett..
[22] Robbert van Renesse,et al. Optimizing layered communication protocols , 1997, Proceedings. The Sixth IEEE International Symposium on High Performance Distributed Computing (Cat. No.97TB100183).
[23] Miguel Castro,et al. Farsite: federated, available, and reliable storage for an incompletely trusted environment , 2002, OPSR.
[24] Marvin Theimer,et al. Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs , 2000, SIGMETRICS '00.
[25] Magnus Karlsson,et al. Taming aggressive replication in the Pangaea wide-area file system , 2002, OPSR.
[26] Robert S. Cahn,et al. Design and Implementation of a Secure Distributed Data Repository , 1998 .
[27] Rafail Ostrovsky,et al. How To Withstand Mobile Virus Attacks , 1991, PODC 1991.
[28] Ben Y. Zhao,et al. Pond: The OceanStore Prototype , 2003, FAST.
[29] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.
[30] Sushil Jajodia,et al. Redistributing Secret Shares to New Access Structures and Its Applications , 1997 .
[31] Randy H. Katz,et al. A case for redundant arrays of inexpensive disks (RAID) , 1988, SIGMOD '88.
[32] Pradeep K. Khosla,et al. Selecting the Right Data Distribution Scheme for a Survivable Storage System (CMU-CS-01-120) , 2001 .
[33] G. R. Blakley,et al. Threshold Schemes with Disenrollment , 1992, CRYPTO.
[34] Moti Yung,et al. Optimal-resilience proactive public-key cryptosystems , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[35] Shigeo Tsujii. On Information Security , 1987 .
[36] Robbert van Renesse,et al. APSS: proactive secret sharing in asynchronous systems , 2005, TSEC.
[37] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[38] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[39] Maurice Herlihy,et al. How to Make Replicated Data Secure , 1987, CRYPTO.
[40] Robbert van Renesse,et al. COCA: a secure distributed online certification authority , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[41] Winfried W. Wilcke,et al. Percolation in dense storage arrays , 2002 .
[42] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[43] Ben Y. Zhao,et al. OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.
[44] Andrew V. Goldberg,et al. A prototype implementation of archival Intermemory , 1999, DL '99.
[45] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[46] Markus Jakobsson,et al. Proactive public key and signature systems , 1997, CCS '97.
[47] Hugo Krawczyk,et al. Robust Threshold DSS Signatures , 1996, Inf. Comput..
[48] Dirk Fox,et al. Digital Signature Standard (DSS) , 2001, Datenschutz und Datensicherheit.
[49] Pradeep K. Khosla,et al. Survivable Information Storage Systems , 2000, Computer.
[50] Silvio Micali,et al. How to Prove all NP-Statements in Zero-Knowledge, and a Methodology of Cryptographic Protocol Design , 1986, CRYPTO.
[51] Josh Benaloh,et al. Secret sharing homomorphisms: keeping shares of a secret secret , 1987, CRYPTO 1987.
[52] Moti Yung,et al. Proactive RSA , 1997, CRYPTO.
[53] Aviel D. Rubin,et al. Publius: a robust, tamper-evident, censorship-resistant web publishing system , 2000 .