共 37 条
[1]
[Anonymous], 1997, Computer and Communications Security, DOI [10.1145/266420.266430, DOI 10.1145/266420.266430]
[2]
[Anonymous], 2005, ACM Transactions on Storage
[3]
Bayer D., 1993, Sequences II: Methods in Communication, Security, and Computer Science, P329, DOI DOI 10.1007/978-1-4613-9323-8_24
[4]
Boneh D, 1996, PROCEEDINGS OF THE SIXTH ANNUAL USENIX SECURITY SYMPOSIUM: FOCUSING ON APPLICATIONS OF CRYPTOGRAPHY, P91
[5]
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2009, 25 (06)
:599-616
[6]
Cachin C., 2013, P 2013 ACM SIGSAC C, P259