共 34 条
- [1] [Anonymous], 2004, IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS), DOI DOI 10.1007/1-4020-7901-X_1
- [2] Outsourced Proofs of Retrievability [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 831 - 843
- [3] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
- [4] Benvenuto C.J., 2012, Galois Field in Cryptography
- [5] Boneh Dan, 2020, AFT '20: Proceedings of the 2nd ACM Conference on Advances in Financial Technologies, P12, DOI 10.1145/3419614.3423258
- [6] Cardano, 2021, MAK WORLD WORK BETT
- [7] Practical byzantine fault tolerance and proactive recovery [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04): : 398 - 461
- [9] Using algebraic signatures to check data possession in cloud storage [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07): : 1709 - 1715
- [10] Connor D.O., 2011, ACM T MATH SOFTWARE, V1, P1