共 26 条
[1]
Abadi M, 2013, LECT NOTES COMPUT SC, V8042, P374, DOI 10.1007/978-3-642-40041-4_21
[3]
Bellare M, 2013, P 22 USENIX C SEC, P179, DOI DOI 10.1109/MPRV.2013.43
[4]
Message-Locked Encryption and Secure Deduplication
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013,
2013, 7881
:296-312
[5]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[6]
Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
[7]
Canetti R, 1997, LECT NOTES COMPUT SC, V1294, P455
[8]
Dodis Y, 2012, LECT NOTES COMPUT SC, V7194, P618, DOI 10.1007/978-3-642-28914-9_35
[9]
Reclaiming space from duplicate files in a serverless distributed file system
[J].
22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS,
2002,
:617-624
[10]
dropbox, 2017, About Us