共 29 条
[1]
Ateniese G., 2008, P 4 EAI SECURECOMM, P1, DOI 10.1145/1460877.1460889
[2]
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[3]
Barsoum A.F., 2013, PROVABLE POSSESSION
[4]
Barsoum A. F., 2013, P IEEE INFOCOM
[6]
Boneh D., 2001, INT C THEORY APPL CR, V2248, P514, DOI 10.1007/3-540-45682-130
[7]
Bowers KevinD., 2009, Proc. of ACM-CCSW '09, P43, DOI DOI 10.1145/1655008.1655015
[8]
MR-PDP: Multiple-Replica Provable Data Possession
[J].
28TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, VOLS 1 AND 2, PROCEEDINGS,
2008,
:411-+
[9]
Dodis Y, 2009, LECT NOTES COMPUT SC, V5444, P109
[10]
Erway CC, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P213