Octavia: References

http://www.cs.auckland.ac.nz/~pgut001/pubs/crypto_guide.txt

tahoe-lafs.org, Tahoe-LAFS home page. http://tahoe-lafs.org/.

Carl Ellison, “Ceremony Design and Analysis”. http://eprint.iacr.org/2007/399.pdf

Click Death Squad, “SSH MitM Downgrade”. http://sites.google.com/site/clickdeathsquad/Home/cds-ssh-mitmdowngrade

Niels Ferguson, Bruce Schneier, and Tadayoshi Kohno. Cryptography Engineering. http://www.schneier.com/book-ce.html

J. H. Saltzer, D. P. Reed, D. D. Clark, “End-to-end Arguments in System Design”. http://web.mit.edu/Saltzer/www/publications/endtoend/endtoend.pdf

Tim Moors, “A Critical Review of ‘End-to-end Arguments in System Design’”. http://www.seas.upenn.edu/~farooq/tcom512/a-critical-review-of_e2e.pdf

Chris Okasaki, Purely Functional Data Structures. http://www.cs.cmu.edu/~rwh/theses/okasaki.pdf

Sean Quinlan and Sean Dorward, “Venti: A New Approach to Archival Storage”. http://doc.cat-v.org/plan_9/4th_edition/papers/venti/

David Wagner and Bruce Schneier, “Analysis of the SSL 3.0 Protocol”. http://www.schneier.com/paper-ssl-revised.pdf

Zooko and Ian Grigg, “Secure Datagram Protocol #1”. http://www.webfunds.org/guide/sdp/sdp1.html

Zooko, “Human-Oriented Base-32 Encoding”. http://zooko.com/repos/z-base-32/base32/DESIGN

David Mazières. Security and Decentralized Control in the SFS Global File System. Master’s thesis, MIT, August 1997. http://www.scs.stanford.edu/~dm/home/papers/mazieres:masters.ps.gz

Kevin Fu, Michael Kaminsky, and David Mazières. Using SFS for a secure network file system. In ;login: The Magazine of Usenix & Sage, 27(6):6-16, December 2002. http://www.scs.stanford.edu/~dm/home/papers/fu:using-sfs.pdf

CC Attribution-ShareAlike