A Game Theoretic Model of a Protocol for Data Possession Verification
暂无分享,去创建一个
[1] Michael Burrows,et al. A Cooperative Internet Backup Scheme , 2003, USENIX Annual Technical Conference, General Track.
[2] Antony I. T. Rowstron,et al. PAST: a large-scale, persistent peer-to-peer storage utility , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.
[3] Marcel Waldvogel,et al. Establishing trust in distributed storage providers , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).
[4] Jean-Jacques Quisquater,et al. Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers , 2003, IICIS.
[5] Paulo S. L. M. Barreto,et al. Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..
[6] Roger Dingledine,et al. The Free Haven Project : design and deployment of an anonymous secure data haven , 2000 .
[7] Miguel Castro,et al. Farsite: federated, available, and reliable storage for an incompletely trusted environment , 2002, OPSR.
[8] Ben Y. Zhao,et al. OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.
[9] Nouha Oualha. Probabilistically secure cooperative distributed storage , 2007 .
[10] H. Grundel,et al. The London School of Economics , 1938, Nature.
[11] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.