How to tell if your cloud files are vulnerable to drive crashes
暂无分享,去创建一个
Ronald L. Rivest | Marten van Dijk | Ari Juels | Alina Oprea | Kevin D. Bowers | A. Juels | R. Rivest | Alina Oprea
[1] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[2] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[3] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[4] David Chaum,et al. Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.
[5] Yale N. Patt,et al. Scheduling algorithms for modern disk drives , 1994, SIGMETRICS 1994.
[6] John Wilkes,et al. An introduction to disk drive modeling , 1994, Computer.
[7] Mihir Bellare,et al. The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.
[8] Erik Riedel,et al. A performance study of sequential I/O on windows NT TM 4 , 1998 .
[9] Ari Juels,et al. $evwu Dfw , 1998 .
[10] Jonathan Katz,et al. On the efficiency of local decoding procedures for error-correcting codes , 2000, STOC '00.
[11] Stanislaw Jarecki,et al. Cryptographic Primitives Enforcing Communication and Storage Complexity , 2002, Financial Cryptography.
[12] Shai Halevi,et al. A Tweakable Enciphering Mode , 2003, CRYPTO.
[13] Tal Garfinkel,et al. Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.
[14] Howard Gobioff,et al. The Google file system , 2003, SOSP '03.
[15] Moni Naor,et al. The complexity of online memory checking , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).
[16] Ramakrishna Kotla,et al. SafeStore: A Durable and Practical Storage System , 2007, USENIX Annual Technical Conference.
[17] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[18] Amin Shokrollahi,et al. Raptor Codes , 2007, 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks.
[19] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[20] Reza Curtmola,et al. MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[21] Bobby Bhattacharjee,et al. Triangle inequality variations in the internet , 2009, IMC '09.
[22] Yevgeniy Dodis,et al. Proofs of Retrievability via Hardness Amplification , 2009, IACR Cryptol. ePrint Arch..
[23] Amar Phanishayee,et al. FAWN: a fast array of wimpy nodes , 2009, SOSP '09.
[24] Irfan Ahmad,et al. Decentralized Deduplication in SAN Cluster File Systems , 2009, USENIX Annual Technical Conference.
[25] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[26] Parag Agrawal,et al. The case for RAMClouds: scalable high-performance storage entirely in DRAM , 2010, OPSR.
[27] Hairong Kuang,et al. The Hadoop Distributed File System , 2010, 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST).
[28] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.