共 17 条
[1]
Ateniese G., Burns R., Curtmola R., Et al., Provable data possession at untrusted stores, ACM CCS, pp. 598-610, (2007)
[2]
Ateniese G., Kamara S., Katz J., Proofs of storage from homomorphic identification protocols, pp. 319-333, (2009)
[3]
Boneh D., Lynn B., Shacham H., Short signature from the weil pairing, ASIACRYPT 2001, pp. 514-532, (2001)
[4]
Shacham H., Waters B., Compact proofs of retrievability, ASIACRYPT 2008, pp. 90-107, (2008)
[5]
Ateniese G., Pietro R.D., Mancini L.V., Et al., Scalable and efficient provable data possession, 4th ICST SecureComm, (2008)
[6]
Wang Q., Wang C., Li J., Et al., Enabling public verifiability and data dynamic for storage security in cloud computing, ESORICS 2009, pp. 355-370, (2009)
[7]
Erway C., Kupcu A., Papamanthou C., Et al., Dynamic provable data possession, Proceedings of ACM CCS, pp. 213-222, (2009)
[8]
Zhu Y., Wang H., Hu Z., Et al., Dynamic audit services for integrity verification of outsourced storage in cloud, ACM SAC, pp. 1550-1557, (2011)
[9]
Zhu Y., Ahn G.J., Hu H., Et al., Dynamic audit services for outsourced storage in clouds, IEEE Transactions on Services Computing, 6, 99, (2013)
[10]
Wang C., Wang Q., Ren K., Et al., Privacy-preserving public auditing for data storage security in cloud computing, IEEE INFOCOM, pp. 525-533, (2010)