共 22 条
[1]
Ateniese G., 2005, P 12 ACM C COMP COMM, P310, DOI DOI 10.1145/1102120.1102161
[2]
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[3]
Bowers K.D., 2009, Workshop on Cloud computing Security (CCSW), P43, DOI DOI 10.1145/1655008.1655015
[4]
Boyang Wang, 2013, 2013 IEEE International Conference on Communications (ICC), P1946, DOI 10.1109/ICC.2013.6654808
[5]
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2009, 25 (06)
:599-616
[6]
Cachin Christian, 2009, SIGACT News, V40, P81, DOI 10.1145/1556154.1556173
[7]
Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584