-
1
-
-
84864572622
-
-
GS1/EPCglobal. [Online]. Available: http://www.gs1.org/epcglobal/
-
GS1/EPCglobal
-
-
-
2
-
-
82155161113
-
-
ver. 1.4, Dec.
-
K. Traub et al., "The EPCglobal architecture framework," ver. 1.4, Dec. 2010. [Online]. Available: http://www.gs1.org/gsmp/kc/epcglobal/ar- chitecture/
-
(2010)
The EPCglobal Architecture Framework
-
-
Traub, K.1
-
3
-
-
45949090154
-
Enhancing information flow in a retail supply chain using RFID and the EPC network: A proof-of-concept approach
-
Apr.
-
S. F. Wamba and H. Boeck, "Enhancing information flow in a retail supply chain using RFID and the EPC network: A proof-of-concept approach," J. Theor. Appl. Electron. Commerce Res., vol. 3, no. 1, pp. 92-105, Apr. 2008.
-
(2008)
J. Theor. Appl. Electron. Commerce Res.
, vol.3
, Issue.1
, pp. 92-105
-
-
Wamba, S.F.1
Boeck, H.2
-
4
-
-
84964711785
-
RFID data sharing in supply chains: What is the value of the EPC network?
-
F. Thiesse and C. Condea, "RFID data sharing in supply chains: What is the value of the EPC network?," Int. J. Electron. Business, vol. 7, no. 1, pp. 21-43, 2009.
-
(2009)
Int. J. Electron. Business
, vol.7
, Issue.1
, pp. 21-43
-
-
Thiesse, F.1
Condea, C.2
-
5
-
-
77958569320
-
Comparison of discovery service architectures for the internet of things
-
Newport Beach, CA
-
S. Evdokimov, B. Fabian, S. Kunz, and N. Schoenemann, "Comparison of discovery service architectures for the internet of things," in Proc. IEEE Int. Conf. Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'10), Newport Beach, CA, 2010, pp. 237-244.
-
(2010)
Proc. IEEE Int. Conf. Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'10)
, pp. 237-244
-
-
Evdokimov, S.1
Fabian, B.2
Kunz, S.3
Schoenemann, N.4
-
6
-
-
82155202398
-
-
EPCglobal May
-
EPCglobal, "Object naming service (ONS) 1.0.1," May 2008. [Online]. Available: http://www.gs1.org/gsmp/kc/epcglobal/ons/
-
(2008)
Object Naming Service (ONS) 1.0.1
-
-
-
7
-
-
41549106216
-
Multipolarity for the object naming service
-
ser. LNCS. New York: Springer
-
S. Evdokimov, B. Fabian, and O. Günther, "Multipolarity for the object naming service," in Internet of Things (IOT'08), Zurich, 2008, ser. LNCS. New York: Springer, 2008, vol. 4952, pp. 1-18.
-
(2008)
Internet of Things (IOT'08), Zurich, 2008
, vol.4952
, pp. 1-18
-
-
Evdokimov, S.1
Fabian, B.2
Günther, O.3
-
8
-
-
67651160706
-
Security challenges of the EPCglobal network
-
B. Fabian and O. Günther, "Security challenges of the EPCglobal network," Commun. ACM, vol. 52, no. 7, pp. 121-125, 2009.
-
(2009)
Commun. ACM
, vol.52
, Issue.7
, pp. 121-125
-
-
Fabian, B.1
Günther, O.2
-
9
-
-
20844459862
-
RFID privacy: An overview of problems and proposed solutions
-
May-Jun.
-
S. Garfinkel, A. Juels, and R. Pappu, "RFID privacy: An overview of problems and proposed solutions," IEEE Security and Privacy, vol. 3, no. 3, pp. 34-43, May-Jun. 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 34-43
-
-
Garfinkel, S.1
Juels, A.2
Pappu, R.3
-
10
-
-
33144457479
-
RFID security and privacy: A research survey
-
Feb.
-
A. Juels, "RFID security and privacy: A research survey," IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 381-394, Feb. 2006.
-
(2006)
IEEE J. Sel. Areas Commun.
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
12
-
-
84864562846
-
-
Website
-
PlanetLab Website. [Online]. Available: http://www.planet-lab.org/
-
-
-
-
13
-
-
84864531004
-
Extensible supply-chain discovery service problem statement
-
A. Rezafard, "Extensible supply-chain discovery service problem statement," IETF, Internet-Draft, 2008 [Online]. Available: http://tools.ietf.org/html/draft-rezafard-esds-problem-statement-03
-
(2008)
IETF, Internet-draft
-
-
Rezafard, A.1
-
15
-
-
41549100029
-
Discovery service design in the EPCglobal network - Towards full supply chain visibility
-
Zurich, 2008, ser. LNCS. New York: Springer
-
C. Kürschner, C. Condea, O. Kasten, and F. Thiesse, "Discovery service design in the EPCglobal network - Towards full supply chain visibility," in Internet of Things (IOT 2008), Zurich, 2008, ser. LNCS. New York: Springer, 2008, vol. 4952, pp. 19-34.
-
(2008)
Internet of Things (IOT 2008)
, vol.4952
, pp. 19-34
-
-
Kürschner, C.1
Condea, C.2
Kasten, O.3
Thiesse, F.4
-
16
-
-
84864562850
-
Extensible supply-chain discovery service concepts
-
Aug. 29 draft-young-esds-concepts-04
-
M. Young, "Extensible supply-chain discovery service concepts," IETF, Internet-Draft, Aug. 29, 2008, draft-young-esds-concepts-04 [Online]. Available: http://tools.ietf.org/html/draft-young-esds-con-cepts-04
-
(2008)
IETF, Internet-draft
-
-
Young, M.1
-
17
-
-
77951755358
-
An aggregating discovery service for the EPCglobal network
-
Hawaii
-
J. Müller, J. Oberst, S. Wehrmeyer, J. Witt, A. Zeier, and H. Plattner, "An aggregating discovery service for the EPCglobal network," in Proc. 43rd Int. Conf. Syst. Sci., Hawaii, 2010.
-
(2010)
Proc. 43rd Int. Conf. Syst. Sci.
-
-
Müller, J.1
Oberst, J.2
Wehrmeyer, S.3
Witt, J.4
Zeier, A.5
Plattner, H.6
-
18
-
-
1542361932
-
Looking up data in P2P systems
-
H. Balakrishnan, M. F. Kaashoek, D. R. Karger, R. Morris, and I. Stoica, "Looking up data in P2P systems," Commun. ACM, vol. 46, no. 2, pp. 43-48, 2003.
-
(2003)
Commun. ACM
, vol.46
, Issue.2
, pp. 43-48
-
-
Balakrishnan, H.1
Kaashoek, M.F.2
Karger, D.R.3
Morris, R.4
Stoica, I.5
-
19
-
-
84947229868
-
Serving DNS using a peer-to-peer lookup service
-
ser. LNCS, Springer
-
R. Cox, A. Muthitacharoen, and R. Morris, "Serving DNS using a peer-to-peer lookup service," in Proc. 1st Int. Workshop on Peer-to-Peer Systems (IPTPS '01), 2002, vol. 2429, pp. 155-165, ser. LNCS, Springer.
-
(2002)
Proc. 1st Int. Workshop on Peer-to-peer Systems (IPTPS '01)
, vol.2429
, pp. 155-165
-
-
Cox, R.1
Muthitacharoen, A.2
Morris, R.3
-
20
-
-
21844441675
-
The design and implementation of a next generation name service for the internet
-
Portland
-
V. Ramasubramanian and E. G. Sirer, "The design and implementation of a next generation name service for the internet," in Proc. ACM SIG-COMM'04, Portland, 2004, pp. 331-342.
-
(2004)
Proc. ACM SIG-COMM'04
, pp. 331-342
-
-
Ramasubramanian, V.1
Sirer, E.G.2
-
21
-
-
33750955128
-
DNS meets DHT: Treating massive ID resolution using DNS over DHT
-
Y. Doi, "DNS meets DHT: Treating massive ID resolution using DNS over DHT," in Proc. Symp. Appl. Internet (SAINT'05), 2005, pp. 9-15.
-
(2005)
Proc. Symp. Appl. Internet (SAINT'05)
, pp. 9-15
-
-
Doi, Y.1
-
22
-
-
84864542914
-
Distributed DNS implementation in IPv6
-
Apr.
-
L. Huang, "Distributed DNS implementation in IPv6," Internet Draft, Apr. 2007. [Online]. Available: http://tools.ietf.org/html/draft-lican- huang-dnsop-distributeddns-03
-
(2007)
Internet Draft
-
-
Huang, L.1
-
23
-
-
0037298256
-
Chord: A scalable peer-to-peer lookup protocol for internet applications
-
I. Stoica, R. Morris, D. Liben-Nowell, D. R. Karger, M. F. Kaashoek, F. Dabek, and H. Balakrishnan, "Chord: A scalable peer-to-peer lookup protocol for internet applications," IEEE/ACM Trans. Networking, vol. 11, no. 1, pp. 17-32, 2003.
-
(2003)
IEEE/ACM Trans. Networking
, vol.11
, Issue.1
, pp. 17-32
-
-
Stoica, I.1
Morris, R.2
Liben-Nowell, D.3
Karger, D.R.4
Kaashoek, M.F.5
Dabek, F.6
Balakrishnan, H.7
-
24
-
-
85040646893
-
CoDNS: Improving DNS performance and reliability via cooperative lookups
-
San Francisco, CA
-
K. Park, V. S. Pai, L. Peterson, and Z. Wang, "CoDNS: Improving DNS performance and reliability via cooperative lookups," in Proc. 6th Symp. Oper. Syst. Design and Implementation (OSDI'04), San Francisco, CA, 2004, pp. 199-214.
-
(2004)
Proc. 6th Symp. Oper. Syst. Design and Implementation (OSDI'04)
, pp. 199-214
-
-
Park, K.1
Pai, V.S.2
Peterson, L.3
Wang, Z.4
-
25
-
-
36949017412
-
ConfiDNS: Leveraging scale and history to improve DNS security
-
Seattle, WA
-
L. Poole and V. S. Pai, "ConfiDNS: Leveraging scale and history to improve DNS security," in Proc. 3rd Workshop on Real, Large Distrib. Syst. (WORLDS'06), Seattle, WA, 2006.
-
(2006)
Proc. 3rd Workshop on Real, Large Distrib. Syst. (WORLDS'06)
-
-
Poole, L.1
Pai, V.S.2
-
26
-
-
21844450653
-
A layered naming architecture for the internet
-
New York
-
H. Balakrishnan, K. Lakshminarayanan, S. Ratnasamy, S. Shenker, I. Stoica, and M. Walfish, "A layered naming architecture for the internet," in Proc. ACM SIGCOMM'04, New York, 2004, pp. 343-352.
-
(2004)
Proc. ACM SIGCOMM'04
, pp. 343-352
-
-
Balakrishnan, H.1
Lakshminarayanan, K.2
Ratnasamy, S.3
Shenker, S.4
Stoica, I.5
Walfish, M.6
-
27
-
-
38549120339
-
Distributed ONS and its impact on privacy
-
Glasgow, U.K.
-
B. Fabian and O. Günther, "Distributed ONS and its impact on privacy," in Proc. IEEE Int. Conf. Commun. (ICC'07), Glasgow, U.K., 2007, pp. 1223-1228.
-
(2007)
Proc. IEEE Int. Conf. Commun. (ICC'07)
, pp. 1223-1228
-
-
Fabian, B.1
Günther, O.2
-
28
-
-
85091111009
-
Handling churn in a DHT
-
S. Rhea, D. Geels, T. Roscoe, and J. Kubiatowicz, "Handling churn in a DHT," in Proc. USENIX Annu. Tech. Conf. (ATEC'04), 2004, pp. 127-140.
-
(2004)
Proc. USENIX Annu. Tech. Conf. (ATEC'04)
, pp. 127-140
-
-
Rhea, S.1
Geels, D.2
Roscoe, T.3
Kubiatowicz, J.4
-
30
-
-
34547318868
-
A distributed ePedigree architecture
-
D. Huang, M. Verma, A. Ramachandran, and Z. Zhou, "A distributed ePedigree architecture," in Proc. 11th Int. Workshop on Future Trends of Distrib. Comput. Syst. (FTDCS'07), 2007.
-
(2007)
Proc. 11th Int. Workshop on Future Trends of Distrib. Comput. Syst. (FTDCS'07)
-
-
Huang, D.1
Verma, M.2
Ramachandran, A.3
Zhou, Z.4
-
31
-
-
57349142855
-
Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems
-
Heidelberg, Germany ser. LNCS, Springer
-
A. I. T. Rowstron and P. Druschel, "Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems," in Proc. IFIP/ACM Int. Conf. Distrib. Syst. Platforms, Heidelberg, Germany, 2001, vol. 2218, pp. 329-350, ser. LNCS, Springer.
-
(2001)
Proc. IFIP/ACM Int. Conf. Distrib. Syst. Platforms
, vol.2218
, pp. 329-350
-
-
Rowstron, A.I.T.1
Druschel, P.2
-
32
-
-
84864531010
-
-
Website
-
FreePastry Website [Online]. Available: http://www.freepastry.org/
-
-
-
-
33
-
-
84870689258
-
P2P architecture for ubiquitous supply chains
-
Verona, Italy
-
N. Schönemann, K. Fischbach, and D. Schoder, "P2P architecture for ubiquitous supply chains," in Proc. 17th Eur. Conf. Inform. Syst. (ECIS'09), Verona, Italy, 2009.
-
(2009)
Proc. 17th Eur. Conf. Inform. Syst. (ECIS'09)
-
-
Schönemann, N.1
Fischbach, K.2
Schoder, D.3
-
34
-
-
84864542912
-
Anglais distributed planetary object name service: Issues and design principles INRIA
-
M. Dias De Amorim, S. Fdida, N. Mitton, L. Schmidt, and D. S. Ryl, Anglais distributed planetary object name service: Issues and design principles INRIA, Res. Rep. RR-7042, 2009. [Online]. Available: http://hal.inria.fr/inria- 00419496/PDF/RR-7042.pdf
-
(2009)
Res. Rep. RR-7042
-
-
Dias De Amorim, M.1
Fdida, S.2
Mitton, N.3
Schmidt, L.4
Ryl, S.D.5
-
35
-
-
77952201890
-
A peer-to-peer RFID resolution framework for supply chain network
-
S. Shrestha, D. S. Kim, S. Lee, and J. S. Park, "A peer-to-peer RFID resolution framework for supply chain network," in Proc. 2nd Int. Conf. Future Networks, 2010, pp. 318-322.
-
(2010)
Proc. 2nd Int. Conf. Future Networks
, pp. 318-322
-
-
Shrestha, S.1
Kim, D.S.2
Lee, S.3
Park, J.S.4
-
36
-
-
79952440765
-
An efficient distributed discovery service for EPCglobal network in nested package scenarios
-
May
-
P. Manzanares-Lopez, J. P. Muñoz-Gea, J. Malgosa-Sanahuja, and J. C. Sanchez-Aarnoutse, "An efficient distributed discovery service for EPCglobal network in nested package scenarios," J. Network Comput. Appl., vol. 34, no. 3, pp. 925-937, May 2011.
-
(2011)
J. Network Comput. Appl.
, vol.34
, Issue.3
, pp. 925-937
-
-
Manzanares-Lopez, P.1
Muñoz-Gea, J.P.2
Malgosa-Sanahuja, J.3
Sanchez-Aarnoutse, J.C.4
-
38
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
M. Rabin, "Efficient dispersal of information for security, load balancing, and fault tolerance," J. ACM, vol. 36, pp. 335-348, 1989.
-
(1989)
J. ACM
, vol.36
, pp. 335-348
-
-
Rabin, M.1
-
39
-
-
0022199386
-
Verifiable secret sharing and achieving simultaneity in the presence of faults
-
IEEE Computer Society
-
B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch, "Verifiable secret sharing and achieving simultaneity in the presence of faults," in Proc. 26th Annu. Symp. Foundations Comput. Sci. (SFCS'85), 1985, pp. 383-395, IEEE Computer Society.
-
(1985)
Proc. 26th Annu. Symp. Foundations Comput. Sci. (SFCS'85)
, pp. 383-395
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
40
-
-
84957080948
-
A simple publicly verifiable secret sharing scheme and its application to electronic voting
-
ser. LNCS, Springer
-
B. Schoenmakers, "A simple publicly verifiable secret sharing scheme and its application to electronic voting," in Proc. Advances in Cryptology - CRYPTO'99, 1999, vol. 1666, pp. 148-164, ser. LNCS, Springer.
-
(1999)
Proc. Advances in Cryptology - CRYPTO'99
, vol.1666
, pp. 148-164
-
-
Schoenmakers, B.1
-
41
-
-
0023538330
-
A practical scheme for non-interactive verifiable secret sharing
-
IEEE Computer Society
-
P. Feldman, "A practical scheme for non-interactive verifiable secret sharing," in Proc. Annu. IEEE Symp. Foundations Comput. Sci., 1987, pp. 427-438, IEEE Computer Society.
-
(1987)
Proc. Annu. IEEE Symp. Foundations Comput. Sci.
, pp. 427-438
-
-
Feldman, P.1
-
42
-
-
85008058260
-
Practical minimalist cryptography for RFID privacy
-
Dec.
-
M. Langheinrich and R. Marti, "Practical minimalist cryptography for RFID privacy," IEEE Syst. J., Special Issue on RFID Technology, vol. 1, no. 2, pp. 115-128, Dec. 2007.
-
(2007)
IEEE Syst. J., Special Issue on RFID Technology
, vol.1
, Issue.2
, pp. 115-128
-
-
Langheinrich, M.1
Marti, R.2
-
43
-
-
57849148576
-
Increasing DHT data security by scattering data
-
(Invited Paper), St. Thomas, Virgin Islands
-
B. N. Mills and T. Znati, "Increasing DHT data security by scattering data," in Proc. 17th Int. Conf. Comput. Commun. Networks (ICCCN '08) (Invited Paper), St. Thomas, Virgin Islands, 2008, pp. 430-434.
-
(2008)
Proc. 17th Int. Conf. Comput. Commun. Networks (ICCCN '08)
, pp. 430-434
-
-
Mills, B.N.1
Znati, T.2
-
44
-
-
85018107502
-
Vanish: Increasing data privacy with self-destructing data
-
Montreal, Canada
-
R. Geambasu, T. Kohno, A. A. Levy, and H. M. Levy, "Vanish: Increasing data privacy with self-destructing data," in Proc. 18th Usenix Security Symp., Montreal, Canada, 2009.
-
(2009)
Proc. 18th Usenix Security Symp.
-
-
Geambasu, R.1
Kohno, T.2
Levy, A.A.3
Levy, H.M.4
-
46
-
-
80053435670
-
-
EPCglobal ver. 1.5, Aug.
-
EPCglobal, "EPC tag data standards," ver. 1.5, Aug. 2010. [Online]. Available: http://www.gs1.org/gsmp/kc/epcglobal/tds/
-
(2010)
EPC Tag Data Standards
-
-
-
47
-
-
0030704545
-
Consistent hashing and random trees
-
El Paso, TX
-
D. Karger, E. Lehman, T. Leighton, R. Panigrahy, M. Levine, and D. Lewin, "Consistent hashing and random trees," in Proc. 29th Annu. ACM Symp. Theory Comput. (STOC'97), El Paso, TX, 1997, pp. 654-663.
-
(1997)
Proc. 29th Annu. ACM Symp. Theory Comput. (STOC'97)
, pp. 654-663
-
-
Karger, D.1
Lehman, E.2
Leighton, T.3
Panigrahy, R.4
Levine, M.5
Lewin, D.6
-
48
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
51
-
-
1542265638
-
US secure hash algorithm 1 (SHA1)
-
D. Eastlake and P. Jones, "US secure hash algorithm 1 (SHA1)," RFC 3174, 2001. [Online]. Available: http://www.ietf.org/rfc/rfc3174.txt
-
(2001)
RFC 3174
-
-
Eastlake, D.1
Jones, P.2
-
54
-
-
84864562871
-
-
Website
-
SSSS Website, [Online]. Available: http://point-at-infinity.org/ssss/
-
SSSS
-
-
-
56
-
-
84864546760
-
-
ser. Advances in Intelligent and Soft Computing, R. S. Choras, Ed. Berlin-Heidelberg: Springer
-
Image Processing and Communications Challenges 2, ser. Advances in Intelligent and Soft Computing, R. S. Choras, Ed. Berlin-Heidelberg: Springer, 2010.
-
(2010)
Image Processing and Communications Challenges 2
-
-
-
57
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
T. Rabin and M. Ben-Or, "Verifiable secret sharing and multiparty protocols with honest majority," in Proc. 21st Annu. ACM Symp. Theory Comput., 1989, pp. 73-85.
-
(1989)
Proc. 21st Annu. ACM Symp. Theory Comput.
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
58
-
-
84947273682
-
The Sybil attack
-
Berlin, Germany LNCS, Springer
-
J. R. Douceur, "The Sybil attack," in Proc. 1st Int. Workshop on Peer-to-Peer Syst. (IPTPS '01), Berlin, Germany, 2002, vol. 2429, pp. 251-260, LNCS, Springer.
-
(2002)
Proc. 1st Int. Workshop on Peer-to-peer Syst. (IPTPS '01)
, vol.2429
, pp. 251-260
-
-
Douceur, J.R.1
-
59
-
-
33646038920
-
Sybil-resistant DHT routing
-
sers. LNCS, Springer
-
G. Danezis, C. Lesniewski-Laas, M. F. Kaashoek, and R. Anderson, "Sybil-resistant DHT routing," in Proc. ESORICS 2005, 2005, vol. 3679, pp. 305-318, sers. LNCS, Springer.
-
(2005)
Proc. ESORICS 2005
, vol.3679
, pp. 305-318
-
-
Danezis, G.1
Lesniewski-Laas, C.2
Kaashoek, M.F.3
Anderson, R.4
-
60
-
-
79551699813
-
A survey of DHT security techniques
-
G. Urdaneta, G. Pierre, and M. V. Steen, "A survey of DHT security techniques," ACM Comput. Surveys, vol. 43, pp. 8:1-8:49, 2011.
-
(2011)
ACM Comput. Surveys
, vol.43
, pp. 81-849
-
-
Urdaneta, G.1
Pierre, G.2
Steen, M.V.3
-
61
-
-
77953882941
-
The transport layer security (TLS) protocol
-
T. Dierks and E. Rescorla, "The transport layer security (TLS) protocol," RFC 4346, 2006. [Online]. Available: http://www.ietf.org/rfc/ rfc4346.txt
-
(2006)
RFC 4346
-
-
Dierks, T.1
Rescorla, E.2
-
62
-
-
33845215790
-
Using PlanetLab for network research: Myths, realities, and best practices
-
N. Spring, L. Peterson, A. Bavier, and V. Pai, "Using PlanetLab for network research: Myths, realities, and best practices," SIGOPS Oper. Syst. Rev., vol. 40, no. 1, pp. 17-24, 2006.
-
(2006)
SIGOPS Oper. Syst. Rev.
, vol.40
, Issue.1
, pp. 17-24
-
-
Spring, N.1
Peterson, L.2
Bavier, A.3
Pai, V.4
-
63
-
-
84875702502
-
Designing a DHT for low latency and high throughput
-
F. Dabek, J. Li, E. Sit, J. Robertson, M. Kaashoek, and R. Morris, "Designing a DHT for low latency and high throughput," in Proc. 1st USENIX Symp. Networked Syst. Design Implementation (NSDI'04), 2004, pp. 85-98.
-
(2004)
Proc. 1st USENIX Symp. Networked Syst. Design Implementation (NSDI'04)
, pp. 85-98
-
-
Dabek, F.1
Li, J.2
Sit, E.3
Robertson, J.4
Kaashoek, M.5
Morris, R.6
|