共 33 条
- [1] Sharing Proofs of Retrievability across Tenants [J]. PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 275 - 287
- [2] Outsourced Proofs of Retrievability [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 831 - 843
- [3] Armknecht F, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P1051
- [4] Ateniese G., 2008, P SECURECOMM, DOI [10.1145/1460877.1460889, DOI 10.1145/1460877.1460889]
- [5] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
- [6] Interactive Message-Locked Encryption and Secure Deduplication [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 516 - 538
- [7] Message-Locked Encryption and Secure Deduplication [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 296 - 312
- [8] Blasco J, 2014, IEEE CONF COMM NETW, P481, DOI 10.1109/CNS.2014.6997518
- [9] Bowers KD, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P501
- [10] Buterin V., 2014, ETHEREUM WHITE PAPER