Securing Ad Hoc Storage through
暂无分享,去创建一个
[1] Paulo S. L. M. Barreto,et al. Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..
[2] Ellen W. Zegura,et al. Capacity Enhancement using Throwboxes in DTNs , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[3] Jean-Jacques Quisquater,et al. Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers , 2003, IICIS.
[4] Chris Schmandt,et al. Location-Aware Information Delivery with ComMotion , 2000, HUC.
[5] Brian D. Noble,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Pastiche: Making Backup Cheap and Easy , 2022 .
[6] A. Harter,et al. Teleporting - Making Applications Mobile , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.
[7] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[8] Paul Syverson,et al. Onion Routing for Anonymous and Private Internet Connections , 1999 .
[9] Michel Banâtre,et al. Collaborative backup for dependable mobile applications , 2004, MPAC '04.
[10] Pietro Michiardi,et al. A Game Theoretic Model of a Protocol for Data Possession Verification , 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[11] Marcel Waldvogel,et al. Establishing trust in distributed storage providers , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).
[12] Mario Gerla,et al. Ad-hoc Storage Overlay System (ASOS): A Delay-Tolerant Approach in MANETs , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[13] Michael Burrows,et al. A Cooperative Internet Backup Scheme , 2003, USENIX Annual Technical Conference, General Track.