C. Batten, K. Barr, A. Saraf, and S. Treptin, pStore: A secure peer-to-peer backup system, 2001.

K. Bennett, C. Grothoff, T. Horozov, and I. Patrascu, Efficient Sharing of Encrypted Data, Proc. of the 7th Australasian Conf. on Information Security and Privacy, pp.107-120, 2002.
DOI : 10.1007/3-540-45450-0_8

W. J. Bolosky, J. R. Douceur, D. Ely, and M. Theimer, Feasibility of a Serverless Distributed File System Deployed on an Existing Set of Desktop PCs, Proc. of the Int. Conf . on Measurement and Modeling of Computer Systems, pp.34-43, 2000.

L. Courtès, M. Killijian, D. Powell, and M. Roy, Sauvegarde coop??rative entre pairs pour dispositifs mobiles, Proceedings of the 2nd French-speaking conference on Mobility and uibquity computing , UbiMob '05, pp.97-104, 2005.
DOI : 10.1145/1102613.1102635

L. P. Cox, B. D. Noble, and . Pastiche, Making Backup Cheap and Easy, 5th USENIX OSDI, pp.285-298, 2002.

Y. Deswarte, L. Blain, and J. Fabre, Intrusion tolerance in distributed computing systems, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy, pp.110-121, 1991.
DOI : 10.1109/RISP.1991.130780

S. Elnikety, M. Lillibridge, and M. Burrows, Peer-to-peer Cooperative Backup System. The USENIX FAST, 2002.

T. J. Gibson and E. L. Miller, Long-Term File Activity Patterns in a UNIX Workstation Environment, Proc. of the 15th IEEE Symp. on MSS, pp.355-372, 1998.

A. V. Goldberg and P. N. Yianilos, Towards an archival Intermemory, Proceedings IEEE International Forum on Research and Technology Advances in Digital Libraries -ADL'98-, pp.147-156, 1998.
DOI : 10.1109/ADL.1998.670389

V. Henson, An Analysis of Compare-by-hash, Proc. of HotOS IX: The 9th HotOS, pp.13-18, 2003.

M. Killijian, D. Powell, M. Banâtre, P. Couderc, and Y. Roudier, Collaborative backup for dependable mobile applications, Proceedings of the 2nd workshop on Middleware for pervasive and ad-hoc computing -, pp.146-149, 2004.
DOI : 10.1145/1028509.1028517

P. Kulkarni, F. Douglis, J. Lavoie, and J. M. Tracey, Redundancy Elimination Within Large Collections of Files, Proc. of the USENIX Annual Technical Conf, 2004.

Y. Lee, K. Leung, and M. Satyanarayanan, Operationbased Update Propagation in a Mobile File System, Proc. of the USENIX Annual Technical Conf, pp.43-56, 1999.

H. Liefke, D. W. Suciu, D. M. Lin, Y. B. Chiu, and . Lee, XMill: an Efficient Compressor for XML Data Erasure Code Replication Revisited, Proc. of the ACM SIGMOD Int. Conf. on Management of Data Proc. of the 4th P2P, pp.153-164, 2000.

B. T. Loo, A. Lamarca, and G. Borriello, Peer-To-Peer Backup for Personal Area Networks, Intel Seattle Research, 2003.

T. Lord, The GNU Arch Distributed Revision Control System, 2005.

U. Manber, Finding Similar Files in a Large File System, Proc. of the USENIX Winter 1994 Conf, pp.1-10, 1994.

A. Muthitacharoen, B. Chen, and D. Mazières, A Low-Bandwidth Network File System, Proc. of the 18th ACM SOSP, pp.174-187, 2001.
DOI : 10.1145/502059.502052

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

S. Quinlan and S. Dorward, Venti: A New Approach to Archival Storage, Proc. of the 1st USENIX FAST, pp.89-101, 2002.

K. Ranganathan, A. Iamnitchi, and I. Foster, Improving Data Availability through Dynamic Model-Driven Replication in Large Peer-to-Peer Communities, 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'02), pp.376-381, 2002.
DOI : 10.1109/CCGRID.2002.1017164

M. Rubel, Rsnapshot: A Remote Filesystem Snapshot Utility Based on Rsync, 2005.

D. S. Santry, M. J. Feeley, N. C. Hutchinson, A. C. Veitch, R. W. Carton et al., Deciding when to forget in the Elephant file system, Proc. of the 17th ACM SOSP, pp.110-123, 1999.

J. S. Shapiro and J. Vanderburgh, CPCMS: A Configuration Management System Based on Cryptographic Names, Proc. of the USENIX Annual Technical Conf., FREENIX Track, pp.207-220, 2002.

M. Stemm, P. Gauthier, D. Harada, and R. H. Katz, Reducing Power Consumption of Network Interfaces in Hand- Held Devices, IEEE Transactions on Communications, issue.8, pp.1125-1131, 1997.

N. Tolia, M. Kozuch, M. Satyanarayanan, B. Karp, T. Bressoud et al., Opportunistic Use of Content Addressable Storage for Distributed File Systems, Proc. of the USENIX Annual Technical Conf, pp.127-140, 2003.

A. Tridgell, P. Russel, and J. Allison, The Trivial Database, 1999.

A. Tridgell and P. Mackerras, The Rsync Algorithm, 1996.

A. Vernois and G. Utard, Data Durability in Peer to Peer Storage Systems, Proc. of the 4th Workshop on Global and Peer to Peer Computing, pp.90-97, 2004.

X. Wang, Y. Yin, and H. Yu, Finding Collisions in the Full SHA-1, Proc. of the CRYPTO Conf, pp.17-36, 2005.
DOI : 10.1007/11535218_2

L. Xu, Hydra, Proceedings of the 2005 ACM workshop on Storage security and survivability , StorageSS '05, pp.108-114, 2005.
DOI : 10.1145/1103780.1103797

L. L. You, K. T. Pollack, and A. D. Long, Deep Store: An Archival Storage System Architecture, 21st International Conference on Data Engineering (ICDE'05), pp.804-815, 2005.
DOI : 10.1109/ICDE.2005.47