共 28 条
[1]
[Anonymous], CONC OP COMM
[2]
[Anonymous], GANACHE OVERVIEW
[3]
[Anonymous], The PBC Go wrapper
[4]
[Anonymous], CRYPTO ECDSA
[5]
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[6]
Darrell Etherington, AMAZON AWS S3 OUTAGE
[7]
An efficient data integrity auditing protocol for cloud computing
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2020, 109
:306-316
[9]
Blockchain Based Data Integrity Verification for Cloud Storage with T-Merkle Tree
[J].
ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2020, PT III,
2020, 12454
:65-80
[10]
Jiangshui Hong, 2019, Web, Artificial Intelligence and Network Applications. Proceedings of the Workshops of the 33rd International Conference on Advanced Information Networking and Applications (WAINA-2019). Advances in Intelligent Systems and Computing (AISC 927), P1055, DOI 10.1007/978-3-030-15035-8_103