暂无分享,去创建一个
[1] R. Michael Buehrer,et al. Toward Optimal Secure Distributed Storage Systems With Exact Repair , 2016, IEEE Transactions on Information Theory.
[2] Swanand Kadhe,et al. Weakly secure regenerating codes for distributed storage , 2014, 2014 International Symposium on Network Coding (NetCod).
[3] Sriram Vishwanath,et al. Secure Cooperative Regenerating Codes for Distributed Storage Systems , 2012, IEEE Transactions on Information Theory.
[4] Wentao Huang,et al. Secure RAID schemes from EVENODD and STAR codes , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).
[5] Wentao Huang,et al. Secure RAID schemes for distributed storage , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[6] Nihar B. Shah,et al. Information-Theoretically Secure Regenerating Codes for Distributed Storage , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[7] Wentao Huang,et al. Secret sharing with optimal decoding and repair bandwidth , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).
[8] Adi Shamir,et al. How to share a secret , 1979, CACM.
[9] Ming Xian,et al. On Secrecy Capacity of Minimum Storage Regenerating Codes , 2015, IEEE Transactions on Information Theory.
[10] Sriram Vishwanath,et al. Optimal Locally Repairable and Secure Codes for Distributed Storage Systems , 2012, IEEE Transactions on Information Theory.
[11] Avi Wigderson,et al. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract) , 1988, STOC.
[12] Ethan L. Miller,et al. POTSHARDS—a secure, recoverable, long-term archival storage system , 2009, TOS.
[13] Wentao Huang,et al. Communication Efficient Secret Sharing , 2015, IEEE Transactions on Information Theory.
[14] Kannan Ramchandran,et al. Securing Dynamic Distributed Storage Systems Against Eavesdropping and Adversarial Attacks , 2010, IEEE Transactions on Information Theory.
[15] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[16] Vinod M. Prabhakaran,et al. On the Communication Complexity of Secure Computation , 2013, IACR Cryptol. ePrint Arch..