[1] 韩德志. 分布式安全存储技术[J]. 计算机科学, 2007, 34(11): 81-83.
[2] Alon N, Kaplan H, Krivelevich M, et al. Scalable secure storage when half the system is faulty [C]// Proceedings of the 27th International Colloquium on
Automata, Languages and Programming (ICALP’00). 2000: 576-587.
[3] Kallahalla M, Riedel E, Swaminathan R, et al. Plutus: Scalable secure file sharing on untrusted storage [C]// Proceedings of the 2nd USENIX Conference
on File and Storage Technologies (FAST’03). 2003: 29-42.
[4] Cattaneo G, Catuogano L, Sorbo A D, et al. The design and implementation of a transparent cryptographic file system for UNIX [C]// Proceedings of the
FREENIX Track: 2001 UNENIX Annual Technical Conference. USENIX: Association Berkeley, 2001: 199-212.
[5] Wallner D, Harder E, Agee R. Key management for multicast: Issues and architectures (RFC2627) [J/OL]. [1999-01-23].
http://tools.ietf.org/html/rfc2627.
[6] Wong C K, Gouda M, Lam S S. Secure group communications using key graphs [J]. IEEE/ACM Transaction on Networking, 2000, 8(1): 16-30.
[7] Kocarev L, Tasev Z. Public-key encryption based on Chebyshev maps [C]// Proceedings of the 2003 International Symposium on Circuits and Systems (ISCAS’03).
2003: 28-31.
[8] 赵耿, 闫慧, 童宗科. 基于Chebyshev 多项式的公钥密码系统算法[J]. 计算机工程, 2008, 34(24): 137-139.