Ateniese, Giuseppe, Roberto Di Pietro, Luigi V. Mancini, and Gene Tsudik. "Scalable and efficient provable data possession." In Proceedings of the 4th international conference on Security and privacy in communication netowrks, p. 9. ACM, 2008.
 Wang, Qian, Cong Wang, Jin Li, Kui Ren, and Wenjing Lou. "Enabling public verifiability and data dynamics for storage security in cloud computing." Computer Securi-ty–ESORICS 2009 (2009): 355-370.
 Hao, Zhuo, and Nenghai Yu. "A multiple-replica remote data possession checking protocol with public verifiability." In Data, Privacy and E-Commerce (ISDPE), 2010 Second International Symposium on, pp. 84-89. IEEE, 2010.
 Ateniese, Giuseppe, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, and Dawn Song. "Provable data possession at untrusted stores." In Proceedings of the 14th ACM conference on Computer and communications security, pp. 598-609. ACM, 2007.
 Sebé, Francesc, Josep Domingo-Ferrer, Antoni Martinez-Balleste, Yves Deswarte, and J-J. Quisquater. "Efficient remote data possession checking in critical information infrastructures." Knowledge and Data Engineering, IEEE Transactions on 20, no. 8 (2008): 1034-1038.
 Erway, Chris, Alptekin Küp?ü, Charalampos Papamanthou, and Roberto Tamassia. "Dynamic provable data possession." In Proceedings of the 16th ACM conference on Computer and communications security, pp. 213-222. ACM, 2009.
 Oualha, Nouha, Melek ?nen, and Yves Roudier. "A security protocol for self-organizing data storage." In Proceed-ings of The Ifip Tc 11 23 rd International Information Security Conference, pp. 675-679. Springer Boston, 2008. (6)
 Duminuco, Alessandro, and Ernst Biersack. "Hierar-chical codes: How to make erasure codes attractive for peer-to-peer storage systems." In Peer-to-Peer Computing, 2008. P2P'08. Eighth International Conference on, pp. 89-98. IEEE, 2008.