{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:42:03Z","timestamp":1725565323584},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540220602"},{"type":"electronic","value":"9783540247685"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24768-5_68","type":"book-chapter","created":{"date-parts":[[2010,9,11]],"date-time":"2010-09-11T01:14:08Z","timestamp":1284167648000},"page":"637-646","source":"Crossref","is-referenced-by-count":4,"title":["A Novel Data Encryption and Distribution Approach for High Security and Availability Using LU Decomposition"],"prefix":"10.1007","author":[{"given":"Sung Jin","family":"Choi","sequence":"first","affiliation":[]},{"given":"Hee Yong","family":"Youn","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"68_CR1","doi-asserted-by":"crossref","unstructured":"Hsiao, H.-I., DeWitt, D.J.: A performance study of three high availability data replication strategies. In: Proceedings of ICPDIS, pp. 18\u201328 (1991)","DOI":"10.1109\/PDIS.1991.183062"},{"key":"68_CR2","first-page":"272","volume-title":"A Technique for Managing Mirrored Disks","author":"D.D.E. Long","year":"2001","unstructured":"Long, D.D.E.: A Technique for Managing Mirrored Disks, pp. 272\u2013277. IEEE, Los Alamitos (2001)"},{"key":"68_CR3","volume-title":"The Management of Replication in a Distributed System","author":"D.D.E. Long","year":"1988","unstructured":"Long, D.D.E.: The Management of Replication in a Distributed System. University of California, San Diego (1988)"},{"key":"68_CR4","doi-asserted-by":"crossref","unstructured":"Bakkaloglu, M., Wylie, J.J., Wang, C., Ganger, G.R.: On Correlated Failures in Survivable Storage Systems: School of Computer Science Carnegie Mellon University, Pittsburgh, PA15213 (2002)","DOI":"10.21236\/ADA461303"},{"key":"68_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1007\/3-540-48405-1_7","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"R. Cannetti","year":"1999","unstructured":"Cannetti, R., Gennaro, R., Jarecki, S., Krawcxyk, H., Rabin, T.: Adaptive Security for Threshold Cryptosystems. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 98\u2013115. Springer, Heidelberg (1999)"},{"key":"68_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/3-540-39568-7_20","volume-title":"Advances in Cryptology","author":"G.R. Blakley","year":"1985","unstructured":"Blakley, G.R., Meadows, C.: Security of ramp schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 242\u2013268. Springer, Heidelberg (1985)"},{"key":"68_CR7","doi-asserted-by":"crossref","unstructured":"Menon, J., Riegel, J., Wyllie, J.C.: Algorithms for Software and Low-Cost Hardware RAIDs. In: COMPCON, pp. 411\u2013418 (1995)","DOI":"10.1109\/CMPCON.1995.512417"},{"key":"68_CR8","doi-asserted-by":"crossref","unstructured":"Patterson, D.A., Gibson, G.A., Katz, R.H.: A Case for Redundant Arrays of Inexpensive Disks (RAID). In: Proceeding of SIGMOD Conference, pp. 109\u2013116 (1988)","DOI":"10.1145\/50202.50214"},{"key":"68_CR9","doi-asserted-by":"crossref","unstructured":"Santis, D., Masucci, B.: Multiple Ramp Schemes. IEEE Trans. Information Theory, 1720\u20131728 (1999)","DOI":"10.1109\/18.771255"},{"key":"68_CR10","doi-asserted-by":"crossref","unstructured":"Karnin, E., Greene, J., Hellman, M.: On Secret Sharing Systems. IEEE Trans. Information Theory, 35\u201341 (1983)","DOI":"10.1109\/TIT.1983.1056621"},{"key":"68_CR11","doi-asserted-by":"crossref","unstructured":"Krawczyk, H.: Distributed fingerprints and secure information dispersal. In: ACM Symposium on Principles of Distributed Computing, pp. 207\u2013218 (1993)","DOI":"10.1145\/164051.164075"},{"key":"68_CR12","first-page":"173","volume-title":"Symposium on Operating Systems Design and Implementation","author":"M. Castro","year":"1999","unstructured":"Castro, M., Liskov, B.: Practical Byzantine fault tolerance. In: Symposium on Operating Systems Design and Implementation, pp. 173\u2013186. ACM Press, New York (1999)"},{"key":"68_CR13","volume-title":"Proc. 14th IFIP International Information Security Conference. (SEC 1998)","author":"A. Iyengar","year":"1998","unstructured":"Iyengar, A., et al.: Design and Implementation of a Secure Distributed Computing Systems. In: Proc. 14th IFIP International Information Security Conference (SEC 1998), ACM Press, New York (1998)"},{"key":"68_CR14","doi-asserted-by":"crossref","unstructured":"Deswarte, Y., Blain, L., Fabre, J.-C.: Intrusion tolerance in distributed computing systems. In: IEEE Symposium on Security and Privacy, pp. 110\u2013121 (1991)","DOI":"10.1109\/RISP.1991.130780"},{"key":"68_CR15","first-page":"33","volume-title":"Linear Algebra","author":"Birkhauser","year":"1997","unstructured":"Birkhauser: Linear Algebra, pp. 33\u201337. Birkhauser, Boston (1997)"},{"key":"68_CR16","first-page":"188","volume-title":"Linear Algebra with Applications","author":"G. Nakos","year":"1998","unstructured":"Nakos, G., Joyner, D.: Linear Algebra with Applications, pp. 188\u2013194. Brooks\/Cole, USA (1998)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24768-5_68.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:55:53Z","timestamp":1605761753000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24768-5_68"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540220602","9783540247685"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24768-5_68","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}