MR-PDP: Multiple-Replica Provable Data Possession
暂无分享,去创建一个
Reza Curtmola | Randal C. Burns | Osama Khan | Giuseppe Ateniese | R. Burns | G. Ateniese | R. Curtmola | O. Khan | Reza Curtmola
[1] Stanislaw Jarecki,et al. Cryptographic Primitives Enforcing Communication and Storage Complexity , 2002, Financial Cryptography.
[2] Joseph Pasquale,et al. Analysis of Long-Running Replicated Systems , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[3] Mihir Bellare,et al. The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.
[4] Robert Tappan Morris,et al. Ivy: a read/write peer-to-peer file system , 2002, OSDI '02.
[5] Miguel Castro,et al. Farsite: federated, available, and reliable storage for an incompletely trusted environment , 2002, OPSR.
[6] Andreas Haeberlen,et al. Efficient Replica Maintenance for Distributed Storage Systems , 2006, NSDI.
[7] Marvin Theimer,et al. Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs , 2000, SIGMETRICS '00.
[8] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[9] Geoffrey M. Voelker,et al. On Object Maintenance in Peer-to-Peer Systems , 2006, IPTPS.
[10] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[11] Paulo S. L. M. Barreto,et al. Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..
[12] Dennis Shasha,et al. Secure Untrusted Data Repository (SUNDR) , 2004, OSDI.
[13] Mihir Bellare,et al. PSS: Provably Secure Encoding Method for Digital Signatures , 1998 .
[14] Robert Tappan Morris,et al. Designing a DHT for Low Latency and High Throughput , 2004, NSDI.
[15] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[16] Andreas Haeberlen,et al. Glacier: highly durable, decentralized storage despite massive correlated failures , 2005, NSDI.
[17] David R. Karger,et al. Wide-area cooperative storage with CFS , 2001, SOSP.
[18] Antony I. T. Rowstron,et al. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility , 2001, SOSP.
[19] Mary Baker,et al. Auditing to Keep Online Storage Services Honest , 2007, HotOS.
[20] Thomer M. Gil,et al. Ivy: a read/write peer-to-peer file system , 2002, OSDI '02.
[21] David Mazières,et al. Tangler: a censorship-resistant publishing system based on document entanglements , 2001, CCS '01.
[22] Victor Shoup,et al. A Proposal for an ISO Standard for Public Key Encryption , 2001, IACR Cryptol. ePrint Arch..
[23] John Kubiatowicz,et al. Erasure Coding Vs. Replication: A Quantitative Comparison , 2002, IPTPS.
[24] Mary Baker,et al. The LOCKSS peer-to-peer digital preservation system , 2005, TOCS.
[25] Michael Burrows,et al. A Cooperative Internet Backup Scheme , 2003, USENIX Annual Technical Conference, General Track.
[26] Ethan L. Miller,et al. Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[27] Mary Baker,et al. A fresh look at the reliability of long-term digital storage , 2005, EuroSys.