Secure distributive storage of decentralized source data: Can interaction help?
暂无分享,去创建一个
Vinod M. Prabhakaran | Kannan Ramchandran | Salim Y. El Rouayheb | K. Ramchandran | S. Rouayheb | V. Prabhakaran
[1] Lawrence H. Ozarow,et al. Wire-tap channel II , 1984, AT&T Bell Lab. Tech. J..
[2] Ben Y. Zhao,et al. Maintenance-Free Global Data Storage , 2001, IEEE Internet Comput..
[3] R. Yeung,et al. Secure network coding , 2002, Proceedings IEEE International Symposium on Information Theory,.
[4] Robert Tappan Morris,et al. Designing a DHT for Low Latency and High Throughput , 2004, NSDI.
[5] Stefan Savage,et al. Total Recall: System Support for Automated Availability Management , 2004, NSDI.
[6] R. Yeung,et al. Network coding theory , 2006 .
[7] Vinod M. Prabhakaran,et al. Decentralized erasure codes for distributed networked storage , 2006, IEEE Transactions on Information Theory.
[8] Emina Soljanin,et al. On Wiretap Networks II , 2007, 2007 IEEE International Symposium on Information Theory.
[9] Emina Soljanin,et al. Secure Network Coding for Wiretap Networks of Type II , 2009, IEEE Transactions on Information Theory.