-
1
-
-
78650128317
-
Reference model for an open archival information system (OAIS)
-
Reference model for an open archival information system (OAIS), 2001. Consultative Committee for Space Data Systems.
-
(2001)
Consultative Committee for Space Data Systems
-
-
-
2
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores. In Proc. of ACM CCS, 2007.
-
(2007)
Proc. of ACM CCS
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
4
-
-
74049144464
-
HAIL: A high-availability and integrity layer for cloud storage
-
K. Bowers, A. Oprea, and A. Juels. HAIL: A high-availability and integrity layer for cloud storage. In Proc. of ACM CCS, 2009.
-
(2009)
Proc. of ACM CCS
-
-
Bowers, K.1
Oprea, A.2
Juels, A.3
-
9
-
-
77955726417
-
Network coding for distributed storage systems
-
A. G. Dimakis, P. B. Godfrey, Y. Wu, M. O. Wainwright, and K. Ramchandran. Network coding for distributed storage systems. IEEE Transactions on Information Theory, 2010.
-
(2010)
IEEE Transactions on Information Theory
-
-
Dimakis, A.G.1
Godfrey, P.B.2
Wu, Y.3
Wainwright, M.O.4
Ramchandran, K.5
-
12
-
-
0142008000
-
The benefits of coding over routing in a randomized setting
-
T. Ho, R. Koetter, M. Medard, D. R. Karger, and M. Effros. The benefits of coding over routing in a randomized setting. In Proc. of IEEE International Symposium on Information Theory (ISIT), 2003.
-
(2003)
Proc. of IEEE International Symposium on Information Theory (ISIT)
-
-
Ho, T.1
Koetter, R.2
Medard, M.3
Karger, D.R.4
Effros, M.5
-
13
-
-
33947399169
-
A random linear network coding approach to multicast
-
DOI 10.1109/TIT.2006.881746
-
T. Ho, M. Medard, R. Koetter, D. R. Karger, M. Effros, J. Shi, and B. Leong. A random linear network coding approach to multicast. IEEE Trans. Inform. Theory, 52(10):4413-4430, 2006. (Pubitemid 46445282)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.10
, pp. 4413-4430
-
-
Ho, T.1
Medard, M.2
Koetter, R.3
Karger, D.R.4
Effros, M.5
Shi, J.6
Leong, B.7
-
14
-
-
70449529634
-
A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding
-
August
-
Y. Jiang, Y. Fan, X. Shena, and C. Lin. A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding. Elsevier Computer Networks, August 2009.
-
(2009)
Elsevier Computer Networks
-
-
Jiang, Y.1
Fan, Y.2
Shena, X.3
Lin, C.4
-
15
-
-
74049103479
-
PORs: Proofs of retrievability for large files
-
A. Juels and B. S. Kaliski. PORs: Proofs of retrievability for large files. In Proc. of ACM CCS, 2007.
-
(2007)
Proc. of ACM CCS
-
-
Juels, A.1
Kaliski, B.S.2
-
16
-
-
0012048989
-
LFSR-based hashing and authentication
-
H. Krawczyk. LFSR-based hashing and authentication. In Crypto '94.
-
Crypto '94
-
-
Krawczyk, H.1
-
17
-
-
85090989484
-
Parity lost and parity regained
-
A. Krioukov, L. N. Bairavasundaram, G. R. Goodson, K. Srinivasan, R. Thelen, A. C. Arpaci-Dusseau, and R. H. Arpaci-Dusseau. Parity lost and parity regained. In Proc. of FAST'08, 2008.
-
(2008)
Proc. of FAST'08
-
-
Krioukov, A.1
Bairavasundaram, L.N.2
Goodson, G.R.3
Srinivasan, K.4
Thelen, R.5
Arpaci-Dusseau, A.C.6
Arpaci-Dusseau, R.H.7
-
18
-
-
16644392046
-
The LOCKSS peer-to-peer digital preservation system
-
P. Maniatis, M. Roussopoulos, T. Giuli, D. Rosenthal, M. Baker, and Y. Muliadi. The LOCKSS peer-to-peer digital preservation system. ACM Transactions on Computer Systems, 23(1):2-50, 2005.
-
(2005)
ACM Transactions on Computer Systems
, vol.23
, Issue.1
, pp. 2-50
-
-
Maniatis, P.1
Roussopoulos, M.2
Giuli, T.3
Rosenthal, D.4
Baker, M.5
Muliadi, Y.6
-
20
-
-
0012086874
-
Bucket hashing and its application to fast message authentication
-
P. Rogaway. Bucket hashing and its application to fast message authentication. In Proc. of CRYPTO '95, 1995.
-
(1995)
Proc. of CRYPTO '95
-
-
Rogaway, P.1
-
21
-
-
85077089362
-
Understanding latent sector errors and how to protect against them
-
B. Schroeder, S. Damouras, and P. Gill. Understanding latent sector errors and how to protect against them. In Proc. of FAST'10, 2010.
-
(2010)
Proc. of FAST'10
-
-
Schroeder, B.1
Damouras, S.2
Gill, P.3
-
23
-
-
0003239571
-
On fast and provably secure message authentication based on universal hashing
-
V. Shoup. On fast and provably secure message authentication based on universal hashing. In Proc. of CRYPTO '96, 1996.
-
(1996)
Proc. of CRYPTO '96
-
-
Shoup, V.1
-
25
-
-
18344385312
-
Erasure coding vs. Replication: A quantitiative comparison
-
H. Weatherspoon and J. D. Kubiatowicz. Erasure coding vs. replication: a quantitiative comparison. In Proc. of IPTPS, 2002.
-
(2002)
Proc. of IPTPS
-
-
Weatherspoon, H.1
Kubiatowicz, J.D.2
-
26
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. N. Wegman and J. L. Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 22(3):265 - 279, 1981.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, Issue.3
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
|