1. Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X.: Provable data possession at untrusted stores. In: Ning, et al. (eds.) NdVS 2007, pp. 598–609 (2007)
2. Bowers, K.D., Juels, A., Oprea, A.: Proofs of retrievability: Theory and implementation. Cryptology ePrint Archive, Report 2008/175 (2008), http://eprint.iacr.org/
3. Dodis, Y., Vadhan, S., Wichs, D.: Proofs of retrievability via hardness amplification (full version). Cryptology ePrint Archive (2009), http://eprint.iacr.org/
4. Goldreich, O., Nisan, N., Wigderson, A.: On yao’s xor-lemma. Electronic Colloquium on Computational Complexity (ECCC) 2(50) (1995)
5. Goldreich, O.: A sample of samplers - a computational perspective on sampling (survey). Electronic Colloquium on Computational Complexity (ECCC) 4(20) (1997)