Securing distributed storage: challenges, techniques, and systemsJan 1, 2005ยทVishal Kher,Yongdae Kimยท 0 min read DOILast updated on Jan 1, 2005 AuthorsVishal KherAuthorsYongdae Kim← Remote Software-Based Attestation for Wireless Sensors Jan 1, 2005Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks Jan 1, 2005 →