1 |
A. Shamir, 'How to Share a Secret,' Comm. ACM, Vol.22, pp.612-613, 1979
DOI
ScienceOn
|
2 |
G. R. Blakley, C. Meadows, 'Security of Ramp Schemes,' Advances in Cryptology CRYPTO, pp.242-268, 1985
|
3 |
J. J. Wyile, M. Bakkaloglu, V. Pandurangan, M. W. Bigrigg, S. Oguz, K. Tew, C. Williams, G. R. Ganger, P. K. Khosla, 'Selecting the Right Data Distribution Scheme for a Survivable Storage System,' Technical Report CMU-CS-01-120 Carnegie Mellon University, 2001
|
4 |
M.O.Rabin, 'Efficient Dispersal of Information for Security, Load Balancing and Faulr Tolerance,' ACM, pp.335-348, 1989
DOI
ScienceOn
|
5 |
Hung-Min Sun, Shiuh-Pyng Shieh, 'Optimal Information Dispersal for Increasing the Reliability of a Distributed Service,' IEEE Trans. Vol.46, pp.462-472, 1997
DOI
ScienceOn
|
6 |
J. J. Wylie, M. W. Bigrigg, J. D. Strunk, G. R. Ganger, H. Kiliccote, P. K. Khosla, 'Survivable information storage systmes,' IEEE Computer, pp.61-68, 2000
DOI
ScienceOn
|