Check out the new USENIX Web site. next up previous
Next: About this document ... Up: An Analysis of Compare-by-hash Previous: Acknowledgments

Bibliography

1
Bitmover, Inc.
Bitkeeper - the scalable distributed software configuration management system.
https://www.bitkeeper.com.

2
Florent Chabuad and Antoine Joux.
Differential collisions in SHA-0.
In Proceedings of CRYPTO '98, 18th Annual International Cryptology Conference, pages 56-71, 1998.

3
Landon P. Cox, Christoper D. Murray, and Brian D. Noble.
Pastiche: Making backup cheap and easy.
In Proceedings of the 5th Symposium on Operating Systems Design and Implementation, 2002.

4
Athicha Muthitacharoen, Benjie Chen, and David Maziéres.
A low-bandwidth network file system.
In Proceedings of the 18th ACM Symposium on Operating Systems Principles, 2001.

5
National Institute of Standards and Technology.
FIPS Publication 180-1: Secure Hash Standard, 1995.

6
Sean Quinlan and Sean Dorward.
Venti: a new approach to archival storage.
In Proceedings of the FAST 2002 Conference on File and Storage Technologies, 2002.

7
M. O. Rabin.
Fingerprinting by random polynomials.
Technical Report TR-15-81, Center for Research in Computer Technology, Harvard University, 1981.

8
B. Van Rompay, B. Preneel, and J. Vandewalle.
On the security of dedicated hash functions.
In 19th Symposium on Information Theory in the Benelux, 1998.

9
Constantine P. Sapuntzakis, Ramesh Chandra, Ben Pfaff, Jim Chow, Monica S. Lam, and Mendel Rosenblum.
Optimizing the migration of virtual computers.
In Proceedings of the 5th Symposium on Operating Systems Design and Implementation, 2002.

10
Bruce Schneier.
Applied Cryptography.
John Wiley & Sons, Inc., second edition, 1996.

11
Jonathan S. Shapiro and John Vanderburgh.
CPCMS: A configuration management system based on cryptographic names.
In Proceedings of the 2002 USENIX Technical Conference, FREENIX Track, 2002.

12
Neil T. Spring and David Wetherall.
A protocol independent technique for eliminating redundant network traffic.
In Proceedings of the 2000 ACM SIGCOMM Conference, 2000.

13
Jonathan Stone and Craig Partridge.
When the CRC and TCP checksum disagree.
In Proceedings of the 2000 ACM SIGCOMM Conference, 2000.

14
Andrew Tridgell.
Efficient Algorithms for Sorting and Synchronization.
PhD thesis, The Australian National University, 1999.



2003-06-16