Secure P2P Data Storage and Maintenance
暂无分享,去创建一个
[1] Brian Neil Levine,et al. A Survey of Solutions to the Sybil Attack , 2006 .
[2] Yves Roudier,et al. Reputation and audits for self-organizing storage , 2008, SOSOC '08.
[3] Alejandro P. Buchmann,et al. Maintaining replicas in unstructured P2P systems , 2008, CoNEXT '08.
[4] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[5] J. Kubiatowicz,et al. Long-Term Data Maintenance in Wide-Area Storage Systems : A Quantitative Approach , 2005 .
[6] D. S. Jones,et al. Differential Equations and Mathematical Biology , 1983 .
[7] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[8] Roger Dingledine,et al. The Free Haven Project : design and deployment of an anonymous secure data haven , 2000 .
[9] Ethan L. Miller,et al. Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[10] Muriel Medard,et al. How good is random linear coding based distributed networked storage , 2005 .
[11] Jean-Jacques Quisquater,et al. Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers , 2003, IICIS.
[12] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[13] Ernst W. Biersack,et al. Hierarchical Codes: How to Make Erasure Codes Attractive for Peer-to-Peer Storage Systems , 2008, 2008 Eighth International Conference on Peer-to-Peer Computing.
[14] Ben Y. Zhao,et al. Maintenance-Free Global Data Storage , 2001, IEEE Internet Comput..
[15] Josep Domingo-Ferrer,et al. Efficient Remote Data Possession Checking in Critical Information Infrastructures , 2008, IEEE Transactions on Knowledge and Data Engineering.
[16] Pietro Michiardi,et al. Analysis of user-driven peer selection in peer-to-peer backup and storage systems , 2008, Valuetools 2008.
[17] Scott Shenker,et al. Minimizing churn in distributed systems , 2006, SIGCOMM.
[18] Stefan Savage,et al. Total Recall: System Support for Automated Availability Management , 2004, NSDI.
[19] Paulo S. L. M. Barreto,et al. Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..
[20] Michael Burrows,et al. A Cooperative Internet Backup Scheme , 2003, USENIX Annual Technical Conference, General Track.
[21] Melek Önen,et al. A Security Protocol for Self-Organizing Data Storage , 2008, SEC.
[22] Emin Gün Sirer,et al. KARMA : A Secure Economic Framework for Peer-to-Peer Resource Sharing , 2003 .