共 83 条
[52]
MERKLE RC, 1990, LECT NOTES COMPUT SC, V435, P218, DOI 10.1007/0-387-34805-0_21
[54]
Narasimha M, 2006, LECT NOTES COMPUT SC, V3882, P420
[55]
Papamanthou C, 2007, LECT NOTES COMPUT SC, V4681, P1, DOI 10.1007/978-3-540-77048-0_1
[56]
Papamanthou C, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P437
[57]
Identity-Based Public Multi-Replica Provable Data Possession
[J].
IEEE ACCESS,
2017, 5
:26990-27001
[59]
Mutual Verifiable Provable Data Auditing in Public Cloud Storage
[J].
JOURNAL OF INTERNET TECHNOLOGY,
2015, 16 (02)
:317-323
[60]
Security Services Using Blockchains: A State of the Art Survey
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2019, 21 (01)
:858-880