1. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., & Song, D. (2007). Provable data possession at untrusted stores. In Proceedings of 14th ACM Conference on Computer and Communication Security (CCS’07) (pp. 598–609), Oct. 2007.
2. Shah, M.A., Baker, M., Mogul, J.C., & Swaminathan, R. (2007). Auditing to keep online storage services honest. In Proceedings of 11th USENIX Workshop Hot Topics in Operating Systems (HotOS ’07) (pp. 1–6).
3. Shah, M.A., Swaminathan, R., & Baker, M. (2008). Privacy-preserving audit and extraction of digital contents. Cryptology ePrint Archive, Report 2008/186, https://eprint.iacr.org.
4. Dobrushkin, V. A. (2009). Methods in algorithmic analysis. CRC Press.
5. Wang, Q., Wang, C., Ren, K., Lou, W., & Li, J. (2011). Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 22(5), 847–859.