1. P. Mell, T. Grance, [online]. http://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-145.pdf. (2011).
2. Preventing silent data corruptions from propagating during data reconstruction;Li;IEEE Trans. Comput.,2010
3. Remote integrity checking;Deswarte,2003
4. Provable data possession at untrusted stores;Ateniese,2007
5. Dynamic provable data possession;Erway,2009