Communications of the ACM - Special section on computer architecture
The connection machine
Communications of the ACM
Probabilistic construction of deterministic algorithms: Approximating packing integer programs
SFCS '86 Proceedings of the 27th Annual Symposium on Foundations of Computer Science
Fault tolerance in hypercube-derivative networks
SPAA '89 Proceedings of the first annual ACM symposium on Parallel algorithms and architectures
Fast computation using faulty hypercubes
STOC '89 Proceedings of the twenty-first annual ACM symposium on Theory of computing
Tight bounds for oblivious routing in the hypercube
SPAA '90 Proceedings of the second annual ACM symposium on Parallel algorithms and architectures
Running algorithms efficiently on faulty hypercubes
SPAA '90 Proceedings of the second annual ACM symposium on Parallel algorithms and architectures
Fast algorithms for bit-serial routing on a hypercube
SPAA '90 Proceedings of the second annual ACM symposium on Parallel algorithms and architectures
Fast-fault-tolerant parallel communication and on-line maintenance using information dispersal
SPAA '90 Proceedings of the second annual ACM symposium on Parallel algorithms and architectures
Reliable broadband communication using a burst erasure correcting code
SIGCOMM '90 Proceedings of the ACM symposium on Communications architectures & protocols
Combining tentative and definite executions for very fast dependable parallel computing
STOC '91 Proceedings of the twenty-third annual ACM symposium on Theory of computing
Broadcast with partial knowledge (preliminary version)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
Bootstrap network resynchronization (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
Simulating (logcn)-wise independence in NC
Journal of the ACM (JACM)
Fault tolerance in hypercube-derivative networks (preliminary version)
ACM SIGARCH Computer Architecture News - Symposium on parallel algorithms and architectures
Running algorithms efficiently on faulty hypercubes (extended abstract)
ACM SIGARCH Computer Architecture News - Symposium on parallel algorithms and architectures
Methods for message routing in parallel machines
STOC '92 Proceedings of the twenty-fourth annual ACM symposium on Theory of computing
STOC '92 Proceedings of the twenty-fourth annual ACM symposium on Theory of computing
STOC '92 Proceedings of the twenty-fourth annual ACM symposium on Theory of computing
The slide mechanism with applications in dynamic networks
PODC '92 Proceedings of the eleventh annual ACM symposium on Principles of distributed computing
Fast Algorithms for Routing Around Faults in Multibutterflies and Randomly-Wired Splitter Networks
IEEE Transactions on Computers - Special issue on fault-tolerant computing
Tolerating Faults in Hypercubes Using Subcube Partitioning
IEEE Transactions on Computers - Special issue on fault-tolerant computing
Distributed fingerprints and secure information dispersal
PODC '93 Proceedings of the twelfth annual ACM symposium on Principles of distributed computing
Multi-scale self-simulation: a technique for reconfiguring arrays with faults
STOC '93 Proceedings of the twenty-fifth annual ACM symposium on Theory of computing
Approximate load balancing on dynamic and asynchronous networks
STOC '93 Proceedings of the twenty-fifth annual ACM symposium on Theory of computing
A survey of PRAM simulation techniques
ACM Computing Surveys (CSUR)
How to securely replicate services
ACM Transactions on Programming Languages and Systems (TOPLAS)
Dynamic load balancing in parallel and distributed networks by random matchings (extended abstract)
SPAA '94 Proceedings of the sixth annual ACM symposium on Parallel algorithms and architectures
STOC '94 Proceedings of the twenty-sixth annual ACM symposium on Theory of computing
Coding-Based Replication Schemes for Distributed Systems
IEEE Transactions on Parallel and Distributed Systems
Deterministic on-line routing on area-universal networks
Journal of the ACM (JACM)
Data broadcasting strategies over multiple unreliable wireless channels
CIKM '95 Proceedings of the fourth international conference on Information and knowledge management
Design and Performance Analysis of Load-Distributing Fault-Tolerant Network
IEEE Transactions on Computers
Improved methods for hiding latency in high bandwidth networks (extended abstract)
Proceedings of the eighth annual ACM symposium on Parallel algorithms and architectures
Automatic methods for hiding latency in high bandwidth networks (extended abstract)
STOC '96 Proceedings of the twenty-eighth annual ACM symposium on Theory of computing
Efficient computations on fault-prone BSP machines
Proceedings of the ninth annual ACM symposium on Parallel algorithms and architectures
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
Tolerating multiple failures in RAID architectures with optimal storage and uniform declustering
Proceedings of the 24th annual international symposium on Computer architecture
k-Pairwise Cluster Fault Tolerant Routing in Hypercubes
IEEE Transactions on Computers
“Dynamic-fault-prone BSP”: a paradigm for robust computations in changing environments
Proceedings of the tenth annual ACM symposium on Parallel algorithms and architectures
A digital fountain approach to reliable distribution of bulk data
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Coding for High Availability of a Distributed-Parallel Storage System
IEEE Transactions on Parallel and Distributed Systems
A prototype implementation of archival Intermemory
Proceedings of the fourth ACM conference on Digital libraries
Combinatorial Properties of Two-Level Hypernet Networks
IEEE Transactions on Parallel and Distributed Systems
Securing information transmission by redundancy
Proceedings of the 1999 workshop on New security paradigms
Matrix structure, polynomial arithmetic, and erasure-resilient encoding/decoding
ISSAC '00 Proceedings of the 2000 international symposium on Symbolic and algebraic computation
Timely and fault-tolerant data access from broadcast disks: a pinwheel-based approach
CIKM '96 Proceedings of the workshop on Databases: active and real-time
Mesh-based content routing using XML
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Wide-area cooperative storage with CFS
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Constructing One-to-Many Disjoint Paths in Folded Hypercubes
IEEE Transactions on Computers
Locally Subcube-Connected Hypercube Networks: Theoretical Analysis and Experimental Results
IEEE Transactions on Computers
Scalable secure storage when half the system is faulty
Information and Computation
COCA: A secure distributed online certification authority
ACM Transactions on Computer Systems (TOCS)
Dynamic parallel access to replicated content in the internet
IEEE/ACM Transactions on Networking (TON)
A Gracefully Degradable Declustered RAID Architecture
Cluster Computing
The Evolving Field of Distributed Storage
IEEE Internet Computing
Line Digraph Iterations and Connectivity Analysis of de Bruijn and Kautz Graphs
IEEE Transactions on Computers
Embedding Cube-Connected Cycles Graphs into Faulty Hypercubes
IEEE Transactions on Computers
Storage Efficient and Secure Replicated Distributed Databases
IEEE Transactions on Knowledge and Data Engineering
Mobile Computing and Databases-A Survey
IEEE Transactions on Knowledge and Data Engineering
Routing in Modular Fault-Tolerant Multiprocessor Systems
IEEE Transactions on Parallel and Distributed Systems
Nearly Optimal One-to-Many Parallel Routing in Star Networks
IEEE Transactions on Parallel and Distributed Systems
Informed content delivery across adaptive overlay networks
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Strong Fault-Tolerance: Parallel Routing in Networks with Faults
ICCS '01 Proceedings of the International Conference on Computational Science-Part II
Node-to-Set Disjoint Paths Problem in Rotator Graphs
ASIAN '00 Proceedings of the 6th Asian Computing Science Conference on Advances in Computing Science
Efficient Sharing of Encrypted Data
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Scalable Secure Storage when Half the System Is Faulty
ICALP '00 Proceedings of the 27th International Colloquium on Automata, Languages and Programming
Models and Techniques for Communication in Dynamic Networks
STACS '02 Proceedings of the 19th Annual Symposium on Theoretical Aspects of Computer Science
Fast and Dependable Communication in Hyper-rings
COCOON '02 Proceedings of the 8th Annual International Conference on Computing and Combinatorics
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
On Strong Menger-Connectivity of Star Graphs
WG '01 Proceedings of the 27th International Workshop on Graph-Theoretic Concepts in Computer Science
A Secure and Highly Available Distributed Store for Meeting Diverse Data Storage Needs
DSN '01 Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS)
Efficient multicast stream authentication using erasure codes
ACM Transactions on Information and System Security (TISSEC)
Efficient non-repudiation multicast source authentication schemes
Journal of Computer Science and Technology
Approaches for a reliable high-performance distributed-parallel storage system
HPDC '96 Proceedings of the 5th IEEE International Symposium on High Performance Distributed Computing
A journey into multicomputer routing algorithms
PAS '95 Proceedings of the First Aizu International Symposium on Parallel Algorithms/Architecture Synthesis
Fault tolerant routing in toroidal networks
PAS '95 Proceedings of the First Aizu International Symposium on Parallel Algorithms/Architecture Synthesis
Bulk Multicast Transport Protocol
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
TCP Boston: A Fragmentation-Tolerant TCP Protocol for ATM Networks
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
Light Weight Security for Parallel Access to Multiple Mirror Sites
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
Responsive Security for Stored Data
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Software for multiprocessor networks on chip
Networks on chip
Secure data transmission in mobile ad hoc networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
On strong Menger-connectivity of star graphs
Discrete Applied Mathematics
Asynchronous Scheduling of Redundant Disk Arrays
IEEE Transactions on Computers
Best-path vs. multi-path overlay routing
Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement
Enabling the Co-Allocation of Grid Data Transfers
GRID '03 Proceedings of the 4th International Workshop on Grid Computing
Deterministic computations on a PRAM with static processor and memory faults
Fundamenta Informaticae
Survivable Monitoring in Dynamic Networks
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
Securing mobile ad hoc networks
The handbook of ad hoc wireless networks
Tight bounds for FEC-based reliable multicast
Information and Computation
Security applications of peer-to-peer networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Batch codes and their applications
STOC '04 Proceedings of the thirty-sixth annual ACM symposium on Theory of computing
Locating internet bottlenecks: algorithms, measurements, and implications
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Erasure Code Replication Revisited
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
Data replication effectiveness in mobile ad-hoc networks
PE-WASUN '04 Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Basic Concepts and Taxonomy of Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing
Informed content delivery across adaptive overlay networks
IEEE/ACM Transactions on Networking (TON)
Distributed Computing
A survey of peer-to-peer content distribution technologies
ACM Computing Surveys (CSUR)
DISP: Practical, efficient, secure and fault-tolerant distributed data storage
ACM Transactions on Storage (TOS)
Dynamic spectrum utilization in ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Military communications systems and technologies
Complexity of pairwise shortest path routing in the grid
Theoretical Computer Science
Design and Evaluation of a Security Scheme for Sensor Networks
ISQED '05 Proceedings of the 6th International Symposium on Quality of Electronic Design
A Mutual Anonymous Peer-to-Peer Protocol Design
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12 - Volume 13
Information Raining and Optimal Link-Layer Design for Mobile Hotspots
IEEE Transactions on Mobile Computing
Plutus: Scalable Secure File Sharing on Untrusted Storage
FAST '03 Proceedings of the 2nd USENIX Conference on File and Storage Technologies
Realizing the benefits of user-level channel diversity
ACM SIGCOMM Computer Communication Review
Strategies for storage of checkpointing data using non-dedicated repositories on Grid systems
MGC '05 Proceedings of the 3rd international workshop on Middleware for grid computing
An approach for fault tolerant and secure data storage in collaborative work environments
Proceedings of the 2005 ACM workshop on Storage security and survivability
Hydra: a platform for survivable and secure data storage systems
Proceedings of the 2005 ACM workshop on Storage security and survivability
Cheating in Visual Cryptography
Designs, Codes and Cryptography
Reliable Packet Transmissions in Multipath Routed Wireless Networks
IEEE Transactions on Mobile Computing
Lightweight, pollution-attack resistant multicast authentication scheme
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
CEFT: A cost-effective, fault-tolerant parallel virtual file system
Journal of Parallel and Distributed Computing
Efficient automatic simulation of parallel computation on networks of workstations
Discrete Applied Mathematics
Decentralized erasure codes for distributed networked storage
IEEE/ACM Transactions on Networking (TON) - Special issue on networking and information theory
Evaluation of crawling policies for a web-repository crawler
Proceedings of the seventeenth conference on Hypertext and hypermedia
Efficient Updates in Highly Available Distributed Random Access Memory
ICPADS '06 Proceedings of the 12th International Conference on Parallel and Distributed Systems - Volume 1
Cyclic Storage for Fault-Tolerant Distributed Executions
IEEE Transactions on Parallel and Distributed Systems
Survivable Monitoring in Dynamic Networks
IEEE Transactions on Mobile Computing
Growth codes: maximizing sensor network data persistence
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Packet-level diversity - from theory to practice: an 802.11-based experimental investigation
Proceedings of the 12th annual international conference on Mobile computing and networking
SNAPI '03 Proceedings of the international workshop on Storage network architecture and parallel I/Os
An overview on MEMS-based storage, its research issues and open problems
SNAPI '04 Proceedings of the international workshop on Storage network architecture and parallel I/Os
Order and balance in continuously-fault-tolerant distributions of objects
PDCN'06 Proceedings of the 24th IASTED international conference on Parallel and distributed computing and networks
Distributed data storage for opportunistic grids
Proceedings of the 3rd international Middleware doctoral symposium
Strategies for Checkpoint Storage on Opportunistic Grids
IEEE Distributed Systems Online
Realizing the e-science desktop peer using a peer-to-peer distributed virtual machine middleware
Proceedings of the 4th international workshop on Middleware for grid computing
Strong Rabin numbers of folded hypercubes
Theoretical Computer Science
Failed disk recovery in double erasure RAID arrays
Journal of Discrete Algorithms
Parallel construction of optimal independent spanning trees on hypercubes
Parallel Computing
Decoding interleaved Reed-Solomon codes over noisy channels
Theoretical Computer Science
Ursa minor: versatile cluster-based storage
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
STAR: an efficient coding scheme for correcting triple storage node failures
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
Palimpsest: soft-capacity storage for planetary-scale services
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Designing a DHT for low latency and high throughput
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
Glacier: highly durable, decentralized storage despite massive correlated failures
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
How to build a trusted database system on untrusted storage
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
MapReduce: simplified data processing on large clusters
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
A game theoretic comparison of TCP and digital fountain based protocols
Computer Networks: The International Journal of Computer and Telecommunications Networking
Failure-aware checkpointing in fine-grained cycle sharing systems
Proceedings of the 16th international symposium on High performance distributed computing
Internet distributed image information system
Integrated Computer-Aided Engineering
Node-disjoint paths in hierarchical hypercube networks
Information Sciences: an International Journal
Verifying distributed erasure-coded data
Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
Adaptive security design with malicious node detection in cluster-based sensor networks
Computer Communications
Low-overhead byzantine fault-tolerant storage
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
Robust computational secret sharing and a unified account of classical secret-sharing goals
Proceedings of the 14th ACM conference on Computer and communications security
Pors: proofs of retrievability for large files
Proceedings of the 14th ACM conference on Computer and communications security
LH*RS: a highly available distributed data storage
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
MapReduce: simplified data processing on large clusters
Communications of the ACM - 50th anniversary issue: 1958 - 2008
Information Sciences: an International Journal
New power-aware routing protocol for mobile ad hoc networks
International Journal of Ad Hoc and Ubiquitous Computing
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
International Journal of Security and Networks
Efficient multicast stream authentication for the fully adversarial network model
International Journal of Security and Networks
A self-balancing striping scheme for NAND-flash storage systems
Proceedings of the 2008 ACM symposium on Applied computing
POTSHARDS: secure long-term storage without encryption
ATC'07 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference
Resisting against aggregator compromises in sensor networks
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
Recovering a website's server components from the web infrastructure
Proceedings of the 8th ACM/IEEE-CS joint conference on Digital libraries
Certificate revocation list distribution in vehicular communication systems
Proceedings of the fifth ACM international workshop on VehiculAr Inter-NETworking
Security in a peer-to-peer data grid storage system
Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead
Securing Overlay Activities of Peers in Unstructured P2P Networks
Computational Intelligence and Security
ISNN '07 Proceedings of the 4th international symposium on Neural Networks: Advances in Neural Networks
A Study of Reconstruction Process Load in P2P Storage Systems
Globe '08 Proceedings of the 1st international conference on Data Management in Grid and Peer-to-Peer Systems
PEAC: a probabilistic, efficient, and resilient authentication protocol for broadcast communications
Proceedings of the 4th international conference on Security and privacy in communication netowrks
A Framework for the Analysis of Mix-Based Steganographic File Systems
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Improving wireless security through network diversity
ACM SIGCOMM Computer Communication Review
Short containers in Cayley graphs
Discrete Applied Mathematics
The Container Problem in Bubble-Sort Graphs
IEICE - Transactions on Information and Systems
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Efficient maintenance of distributed data in highly dynamic opportunistic grids
Proceedings of the 2009 ACM symposium on Applied Computing
POTSHARDS—a secure, recoverable, long-term archival storage system
ACM Transactions on Storage (TOS)
JigDFS in container communities for international cargo security
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
Preserving Privacy versus Data Retention
TAMC '09 Proceedings of the 6th Annual Conference on Theory and Applications of Models of Computation
On Disjoint Shortest Paths Routing on the Hypercube
COCOA '09 Proceedings of the 3rd International Conference on Combinatorial Optimization and Applications
Why web sites are lost (and how they're sometimes found)
Communications of the ACM - Scratch Programming for All
Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services
Survey on Oblivious Routing Strategies
CiE '09 Proceedings of the 5th Conference on Computability in Europe: Mathematical Theory and Computational Practice
Fault recovery mechanism in single-hop sensor networks
Computer Communications
Securing bulk content almost for free
Computer Communications
Content-access QoS in peer-to-peer networks using a fast MDS erasure code
Computer Communications
One-to-many node-disjoint paths in (n,k)-star graphs
Discrete Applied Mathematics
Authentication schemes for multimedia streams: Quantitative analysis and comparison
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Secure framework for multipath multimedia streaming over wireless ad hoc network
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
International Journal of Security and Networks
Ensuring Authentication of Digital Information Using Cryptographic Accumulators
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
PACISSO: P2P access control incorporating scalability and self-organization for storage systems
PACISSO: P2P access control incorporating scalability and self-organization for storage systems
Authenticated error-correcting codes with applications to multicast authentication
ACM Transactions on Information and System Security (TISSEC)
Efficient automatic simulation of parallel computation on networks of workstations
Discrete Applied Mathematics
Distributed Backup through Information Dispersal
Electronic Notes in Theoretical Computer Science (ENTCS)
Enhancing data security in ad hoc networks based on multipath routing
Journal of Parallel and Distributed Computing
A lower bound on the encoding length in lossy transmission
Information Sciences: an International Journal
Cooperative recovery of distributed storage systems from multiple losses with network coding
IEEE Journal on Selected Areas in Communications
Maintaining and checking parity in highly available Scalable Distributed Data Structures
Journal of Systems and Software
Application execution management on the InteGrade opportunistic grid middleware
Journal of Parallel and Distributed Computing
Classification of ideal homomorphic threshold schemes over finite Abelian groups
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
General short computational secret sharing schemes
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Decoding of interleaved Reed Solomon codes over noisy data
ICALP'03 Proceedings of the 30th international conference on Automata, languages and programming
Dynamic distribution for data storage in a P2P network
GPC'07 Proceedings of the 2nd international conference on Advances in grid and pervasive computing
Some applications of polynomials for the design of cryptographic protocols
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
Combining prediction hashing and MDS codes for efficient multicast stream authentication
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Dependable and secure distributed storage system for ad hoc networks
ADHOC-NOW'07 Proceedings of the 6th international conference on Ad-hoc, mobile and wireless networks
Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
Recursive secret sharing for distributed storage and information hiding
ANTS'09 Proceedings of the 3rd international conference on Advanced networks and telecommunication systems
Application of distributed safe log management in small-scale, high-risk system
IIT'09 Proceedings of the 6th international conference on Innovations in information technology
Dependability metrics
Spread spectrum storage with mnemosyne
Future directions in distributed computing
A security framework for a workflow-based grid development platform
Computer Standards & Interfaces
FNT-based Reed-Solomon erasure codes
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
EEO: an efficient MDS-like RAID-6 code for parallel implementation
Sarnoff'10 Proceedings of the 33rd IEEE conference on Sarnoff
HotDep'08 Proceedings of the Fourth conference on Hot topics in system dependability
Secure multi-path data deliver in sensor networks
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Rendezvous tunnel for anonymous publishing
Proceedings of the 17th ACM conference on Computer and communications security
Space efficient secret sharing for implicit data security
Information Sciences: an International Journal
Node-disjoint paths in hierarchical hypercube networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Dependable computing: concepts, limits, challenges
FTCS'95 Proceedings of the Twenty-Fifth international conference on Fault-tolerant computing
Data-centric privacy protocol for intensive care grids
IEEE Transactions on Information Technology in Biomedicine
Resilient P2P anonymous routing by using redundancy
International Journal of High Performance Computing and Networking
Resilient Security Mechanism for Wireless Ad hoc Network
Wireless Personal Communications: An International Journal
AONT-RS: blending security and performance in dispersed storage systems
FAST'11 Proceedings of the 9th USENIX conference on File and stroage technologies
Plutus: scalable secure file sharing on untrusted storage
FAST'03 Proceedings of the 2nd USENIX conference on File and storage technologies
Journal of Network and Computer Applications
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance
ACM Transactions on Sensor Networks (TOSN)
A comprehensive framework for secure query processing on relational data in the cloud
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
Hybrid approaches for distributed storage systems
Globe'11 Proceedings of the 4th international conference on Data management in grid and peer-to-peer systems
Rendezvous tunnel for anonymous publishing: clean slate and tor based designs
SSS'11 Proceedings of the 13th international conference on Stabilization, safety, and security of distributed systems
Fast Access to Distributed Atomic Memory
SIAM Journal on Computing
CIS'04 Proceedings of the First international conference on Computational and Information Science
Improving reliability of distributed storage
IICS'05 Proceedings of the 5th international conference on Innovative Internet Community Systems
Container problem in burnt pancake graphs
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
A parallel routing algorithm on circulant networks employing the hamiltonian circuit latin square
NPC'05 Proceedings of the 2005 IFIP international conference on Network and Parallel Computing
Efficient dos resistant multicast authentication schemes
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
A parallel routing algorithm on 2-circulant networks employing the hamiltonian circuit latin square
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Protecting secret data from insider attacks
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Two conditions for reducing the maximal length of node-disjoint paths in hypercubes
Theoretical Computer Science
Using MDS codes for the key establishment of wireless sensor networks
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
On the limits of cyber-insurance
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Resource requirement analysis for a predictive-hashing based multicast authentication protocol
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Topological properties of folded hyper-star networks
The Journal of Supercomputing
Reliably, securely and efficiently distributing electronic content using multicasting
EC-Web'05 Proceedings of the 6th international conference on E-Commerce and Web Technologies
Node-to-Set disjoint paths problem in bi-rotator graphs
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
Fault tolerant routing algorithm in hypercube networks with load balancing support
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
High availability in DHTs: erasure coding vs. replication
IPTPS'05 Proceedings of the 4th international conference on Peer-to-Peer Systems
Chosen-ciphertext security of multiple encryption
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Fault-Tolerant node-to-set disjoint-path routing in hypercubes
ICA3PP'10 Proceedings of the 10th international conference on Algorithms and Architectures for Parallel Processing - Volume Part I
A secure checkpointing protocol for survivable server design
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
Optimal resilience for erasure-coded byzantine distributed storage
DISC'05 Proceedings of the 19th international conference on Distributed Computing
A parallel routing algorithm on circulant networks employing the Hamiltonian circuit latin square
Information Sciences: an International Journal
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
Efficient multicast stream authentication for the fully adversarial network model
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Unconditionally secure information authentication in presence of erasures
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
On anonymity with identity escrow
FAST'05 Proceedings of the Third international conference on Formal Aspects in Security and Trust
Secure data management in the cloud
DNIS'11 Proceedings of the 7th international conference on Databases in Networked Information Systems
NCCloud: applying network coding for the storage repair in a cloud-of-clouds
FAST'12 Proceedings of the 10th USENIX conference on File and Storage Technologies
One-to-many node-disjoint paths of hyper-star networks
Discrete Applied Mathematics
The Cyclone Server Architecture: streamlining delivery of popular content
Computer Communications
QoS-sensitive transport of real-time MPEG video using adaptive redundancy control
Computer Communications
Deterministic Computations on a PRAM with Static Processor and Memory Faults
Fundamenta Informaticae
Secure distributed storage for bulk data
ICONIP'12 Proceedings of the 19th international conference on Neural Information Processing - Volume Part V
International Journal of Cloud Applications and Computing
An approach for constructing private storage services as a unified fault-tolerant system
Journal of Systems and Software
A security pattern for data integrity in P2P systems
Proceedings of the 17th Conference on Pattern Languages of Programs
Multiswapped networks and their topological and algorithmic properties
Journal of Computer and System Sciences
DepSky: Dependable and Secure Storage in a Cloud-of-Clouds
ACM Transactions on Storage (TOS)
Research note: An efficient construction of one-to-many node-disjoint paths in folded hypercubes
Journal of Parallel and Distributed Computing
Taking Advantage of Federated Cloud Storage and Multi-core Technology in Content Delivery
UCC '13 Proceedings of the 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing
Hi-index | 0.03 |
An Information Dispersal Algorithm (IDA) is developed that breaks a file F of length L = ↿ F↾ into n pieces Fi, l ≤ i ≤ n, each of length ↿Fi↾ = L/m, so that every m pieces suffice for reconstructing F. Dispersal and reconstruction are computationally efficient. The sum of the lengths ↿Fi↾ is (n/m) · L. Since n/m can be chosen to be close to l, the IDA is space efficient. IDA has numerous applications to secure and reliable storage of information in computer networks and even on single disks, to fault-tolerant and efficient transmission of information in networks, and to communications between processors in parallel computers. For the latter problem provably time-efficient and highly fault-tolerant routing on the n-cube is achieved, using just constant size buffers.