共 21 条
[1]
Ateniese G., Burns R., Curtmola R., Herring J., Kissner L., Peterson Z., Song D., Provable Data Possession at Untrusted Stores, Proceedings of 14th ACM CCS, pp. 598-609, (2007)
[2]
Ateniese G., Pietro R.D., Mancini L.V., Tsudik G., Scalable and Efficient Provable Data Possession, Proceedings of 4th International Conference on Security and Privacy in Communication Networks, (2008)
[3]
Wang C., Wang Q., Ren K., Lou W., Privacy-preserving Public Auditing for Data storage Security in Cloud Computing, Proceedings of 29th IEEE INFOCOM, pp. 1-9, (2010)
[4]
Wang Q., Wang C., Li J., Et al., Enabling Public Verifiability and Data Dynamics for Storage Seccurity in Cloud Computing, Proceedings of ESORICS'09, pp. 355-370, (2009)
[5]
Juels A., Kaliski B., PORs: Proofs of Retrievability for Large Files, Proceedings of 14th ACM CCS, pp. 584-597, (2007)
[6]
Shacham H., Waters B., Compact Proofs of Retrievability, Proceedings of 14th ASIACRYPT, pp. 90-107, (2008)
[7]
Bowers K.D., Juels A., Oprea A., Proofs of Retrievability: Theory and Implementation, Proceedings of ACM workshop on Cloud Computing security, pp. 43-53, (2009)
[8]
An B., Zhou L., Gong Z., Xiao D., Yang Y., Xu G., Chen J., Light-weight Proofs of Retrievability in Cloud Archive Storage with Replications, JDCTA:International Journal of Digital Content Technology and its Applications, 6, 10, pp. 127-135, (2012)
[9]
Xiao D., Yang Y., Yao W.B., Et al., Multiple-File Remote Data Checking for Cloud Storage, Computers and Security, 31, 2, pp. 192-205, (2012)
[10]
Chen L., Guo G., An Efficient Remote Data Possession Checking in Cloud Storage, JDCTA: International Journal of Digital Content Technology and its Applications, 5, 4, pp. 43-50, (2011)