共 20 条
[1]
Bessani A., Correia M., Quaresma B., Et al., DepSky: dependable and secure storage in a cloud-of-clouds, Proceedings of ACM EuroSys, pp. 31-46, (2011)
[2]
Dimakis A.G., Godfrey P.G., Wu Y., Et al., Network coding for distributed storage systems, IEEE Transactions on Information Theory, 56, 9, pp. 4539-4551, (2010)
[3]
Shamir A., How to share a secret, Communications of the ACM, 22, 11, pp. 612-613, (1979)
[4]
Yamamoto H., Secret sharing system using (k, l, n) threshold scheme, Electronics and Communications in Japan (Part I: Communications), 69, 9, pp. 46-54, (1986)
[5]
Oliveira P.F., Lima L., Vinhoza T.T.V., Et al., Coding for trusted storage in untrusted networks, IEEE Transactions on Information Forensics and Security, 7, 6, pp. 1890-1899, (2012)
[6]
Kurihara M., Kuwakado H., Secret sharing schemes based on minimum bandwidth regenerating codes, 2012 International Symposium on Information Theory and its Applications (ISITA), pp. 255-259, (2012)
[7]
Rawat A.S., Koyluoglu O.O., Silberstein N., Et al., Optimal locally repairable and secure codes for distributed storage systems, (2013)
[8]
Rawat A.S., Koyluoglu O.O., Silberstein N., Et al., Secure locally repairable codes for distributed storage systems, (2013)
[9]
Pawar S., Rouayheb E.S., Ramchandran K., Securing dynamic distributed storage systems against eavesdroppingand adversarial attacks, IEEE Transactions on Information Theory, 58, 10, pp. 6734-6753, (2012)
[10]
Shah N.B., Rashmi K.V., Kumar P.V., Information-theoretically secure regenerating codes for distributed storage, Proceedings of IEEE Global Communications Conference (GLOBECOM), pp. 1-5, (2011)