1Oualha N, Roudier Y. Reputation and audits for self-organizing storage[C]//Proceedings of the workshop on Security in Opportunistic and social networks, ACM, 2008(02).
2A. Juels and B. Kaliski. PORs:Proofs of retrievability for large files. In P. Ning, S. De Capitani di Vimercati, and P. Syverson, editors, ACM Conference on Computer and Communication Security(CCS'07).hCM, 2007.
3G. Ateniese, R. Burns,R. eurtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at -ntrusted stores. In P. Ning, S. De Capitani di Vimercati, and P. Syverson, editors, ACM Conference on Computer and Communication Security (CCS'07).ACM Press, 2007.
4C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia. Dynamic provable data possession. In ACM conference on Computer and communications security (CCS'09),2009. ACN.
5N.P. Chopey, T.G. Hicks, Handbook of Chemical Engineering Calculations, Third Edition, McGraw-Hill, 2003.
6D.W. Green, R.H. Perry, Perry Chemical Engineering Handbook, Eighth Edition, McGraw-Hill, 2007.
7N.P. Chopey, T.G. Hicks, Handbook of Chemical Engineering Calculations, Third Edition, McGraw-Hill, 2003.
8D.W. Green, R.H. Perry, Perry Chemical Engineering Handbook, Eighth Edition, McGraw-Hill, 2007.