1. Aguilera, M. K., Janakiraman, R., Xu, L. (2010). Reliable and secure distributed storage using erasure codes. Technical report, Washington University in St. Louis.
2. Aikebaier, A., Enokido, T., & Takizawa, M. (2011). rustworthy group making algorithm in distributed systems. Human-centric Computing and Information Sciences, 1(6), 1–15.
3. Almulla, S. A., Yeun, C. Y. (2011). New secure storage architecture for cloud computing. In Proceedings of the international conference on future information technology (FutureTech) (pp. 75–84).
4. Best, R.M. (1980). Preventing software piracy with Crypto-microprocessors. In Proceedings of the spring COMPCON conference (pp. 466–469).
5. Chun, B., Culler, D., Roscoe, T., Bavier, A., Peterson, L., Wawrzoniak, M., et al. (2003). Planetlab: An overlay testbed for broad-coverage services. ACM SIGCOMM Computer Communication Review, 33(3), 3–12.