1. “A survey and comparison of peer-to-peer overlay network schemes,”;Lua;IEEE Communications Surveys and Tutorials,2005
2. “A survey of dht security techniques,”;Urdaneta;ACM Computing Surveys,2011
3. R. Perlman, “File system design with assured delete,” Third IEEE International Security in Storage Workshop (SISW’05), pp. 83–88, 2005.
4. Q. Tang, “Timed-ephemerizer: Make assured data appear and disappear,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artifcial Intelligence and Lecture Notes in Bioinformatics), vol. 6391 LNCS, pp. 195–208, 2010.
5. “FADE: Secure Overlay Cloud Storage with File Assured Deletion,”;Tang;Security and Privacy in Communication Networks,2010