共 17 条
[11]
Wang C., Chow S.S., Wang Q., Et al., Privacy-preserving public auditing for secure cloud storage, IEEE Transactions on Computers, 62, 2, pp. 362-375, (2013)
[12]
Boneh D., Gentry C., Lynn B., Et al., Aggregate and verifiably encrypted signatures from bilinear maps, EUROCRYPT 2003, pp. 416-432, (2003)
[13]
Zhu Y., Wang H., Hu Z., Et al., Poster: efficient provable data possession for hybird clouds, ACM CCS, (2010)
[14]
Tate S.R., Vishwanathan R., Everhart L., Multi-user dynamic proofs of data possession using trusted hardware, ACM CODASPY, pp. 353-364, (2013)
[15]
Wang B., Li B., Li H., Oruta: privacy-preserving public auditing for shared data in the cloud, IEEE 5th International Conference on Cloud Computing (CLOUD'12), pp. 295-302, (2012)
[16]
Wang B., Li B., Li H., Knox: privacy-preserving auditing for shared data with large groups in the cloud, 10th International Conference on Applied Cryptography and Network Security (ACNS'12), pp. 507-525, (2012)
[17]
Wang B., Li B., Li H., Public auditing for shared data with efficient user revocation in the cloud, 2013 IEEE International Conference on Computer Communication (INFOCOM'13), pp. 2904-2912, (2013)