-
1
-
-
0034440650
-
Oceanstore: An architecture for global-scale persistent storage
-
J. Kubiatowicz, D. Bindel, Y. Chen, S.E. Czerwinski, P.R. Eaton, D. Geels, R. Gummadi, S.C. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B.Y. Zhao, "Oceanstore: An Architecture for Global-Scale Persistent Storage," Proc. Ninth Int'l Conf. Architectural Support for Programming Languages and Operating Systems (ASPLOS), vol. 35, pp. 190-201, 2000.
-
(2000)
Proc. Ninth Int'l Conf. Architectural Support for Programming Languages and Operating Systems (ASPLOS)
, vol.35
, pp. 190-201
-
-
Kubiatowicz, J.1
Bindel, D.2
Chen, Y.3
Czerwinski, S.E.4
Eaton, P.R.5
Geels, D.6
Gummadi, R.7
Rhea, S.C.8
Weatherspoon, H.9
Weimer, W.10
Wells, C.11
Zhao, B.Y.12
-
2
-
-
0035439055
-
Maintenance-free global data storage
-
Sept.
-
S.C. Rhea, C. Wells, P.R. Eaton, D. Geels, B.Y. Zhao, H. Weatherspoon, and J. Kubiatowicz, "Maintenance-Free Global Data Storage," IEEE Internet Computing, vol. 5, no. 5, pp. 40-49, Sept. 2001.
-
(2001)
IEEE Internet Computing
, vol.5
, Issue.5
, pp. 40-49
-
-
Rhea, S.C.1
Wells, C.2
Eaton, P.R.3
Geels, D.4
Zhao, B.Y.5
Weatherspoon, H.6
Kubiatowicz, J.7
-
3
-
-
0036041927
-
Wide area cooperative storage with cfs
-
F. Dabek, M.F. Kaashoek, D. Karger, R. Morris, and I. Stoica, "Wide Area Cooperative Storage with cfs," Proc. 18th Symp. Operating Systems Principles (SOSP), pp. 202-215, 2001.
-
(2001)
Proc. 18th Symp. Operating Systems Principles (SOSP)
, pp. 202-215
-
-
Dabek, F.1
Kaashoek, M.F.2
Karger, D.3
Morris, R.4
Stoica, I.5
-
4
-
-
36248991171
-
How good is random linear coding based distributed networked storage
-
S. Acedanski, S. Deb, M. Medard, and R Keettor, "How Good Is Random Linear Coding Based Distributed Networked Storage," Proc. First Workshop Network Coding, Theory, and Applications - NetCod, 2005.
-
(2005)
Proc. First Workshop Network Coding, Theory, and Applications - NetCod
-
-
Acedanski, S.1
Deb, S.2
Medard, M.3
Keettor, R.4
-
5
-
-
25644448947
-
Network coding for large scale content distribution
-
C. Gkantsidis and P. Rodriguez, "Network Coding for Large Scale Content Distribution," Proc. IEEE INFOCOM, vol. 4, pp. 2235-2245, 2005.
-
(2005)
Proc. IEEE INFOCOM
, vol.4
, pp. 2235-2245
-
-
Gkantsidis, C.1
Rodriguez, P.2
-
6
-
-
0034229404
-
Network information flow
-
R. Ahlswede, N. Cai, S.-Y.R. Li, and R.W. Yeung, "Network Information Flow," IEEE Trans. Information Theory, vol. 46, no. 4, pp. 1204-1216, 2000.
-
(2000)
IEEE Trans. Information Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.-Y.R.3
Yeung, R.W.4
-
7
-
-
0037323073
-
Linear network coding
-
Feb.
-
S.-Y.R. Li, RW. Yeung, and N. Cai, "Linear Network Coding," IEEE Trans. Information Theory, vol. 49, no. 2, pp. 371-381, Feb. 2003.
-
(2003)
IEEE Trans. Information Theory
, vol.49
, Issue.2
, pp. 371-381
-
-
Li, S.-Y.R.1
Yeung, R.W.2
Cai, N.3
-
8
-
-
33745180496
-
Decentralized erasure codes for distributed networked storage
-
DOI 10.1109/TIT.2006.874535
-
A.G Dimakis, V. Prabhakaran, and K. Ramchandran, "Decentralized Erasure Codes for Distributed Networked Storage," IEEE Trans. Information Theory, vol. 52, no. 6, pp. 2809-2816, June 2006. (Pubitemid 43898929)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.6
, pp. 2809-2816
-
-
Dimakis, A.G.1
Prabhakaran, V.2
Ramchandran, K.3
-
9
-
-
84957626176
-
Proactive secret sharing or: How to cope with perpetual leakage
-
A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung, "Proactive Secret Sharing or: How to Cope with Perpetual Leakage," Proc. 15th Ann. Int'l Cryptology Conf. - CRYPTO, pp. 339-352, 1995.
-
(1995)
Proc. 15th Ann. Int'l Cryptology Conf. - CRYPTO
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
10
-
-
0038687710
-
Asynchronous verifiable secret sharing and proactive cryptosystems
-
C. Cachin, K. Kursawe, A. Lysyanskaya, and R. Strobl, "Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems," Proc. Ninth ACM Conf. Computer and Comm. Security (CCS), pp. 88-97, 2002.
-
(2002)
Proc. Ninth ACM Conf. Computer and Comm. Security (CCS)
, pp. 88-97
-
-
Cachin, C.1
Kursawe, K.2
Lysyanskaya, A.3
Strobl, R.4
-
12
-
-
33745655389
-
Chosen ciphertext secure public key threshold encryption without random oracles
-
D. Boneh, X. Boyen, and S. Halevi, "Chosen Ciphertext Secure Public Key Threshold Encryption without Random Oracles," Proc. Topics in Cryptology (CT-RSA), pp. 226-243, 2006.
-
(2006)
Proc. Topics in Cryptology (CT-RSA)
, pp. 226-243
-
-
Boneh, D.1
Boyen, X.2
Halevi, S.3
-
13
-
-
23044435243
-
Efficient implementation of pairing-based cryptosystems
-
P.S.L.M. Barreto, B. Lynn, and M. Scott, "Efficient Implementation of Pairing-Based Cryptosystems," J. Cryptology, vol. 17, no. 4, pp. 321-334, 2004.
-
(2004)
J. Cryptology
, vol.17
, Issue.4
, pp. 321-334
-
-
Barreto, P.S.L.M.1
Lynn, B.2
Scott, M.3
-
14
-
-
22144445920
-
The weil pairing, and its efficient calculation
-
V.S. Miller, "The Weil Pairing, and Its Efficient Calculation," J. Cryptology, vol. 17, no. 4, pp. 235-261, 2004.
-
(2004)
J. Cryptology
, vol.17
, Issue.4
, pp. 235-261
-
-
Miller, V.S.1
|