共 34 条
[1]
[Anonymous], 2003, Working Conference on Integrity and Internal Control in Information Systems
[2]
Outsourced Proofs of Retrievability
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:831-843
[3]
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[4]
Benvenuto C.J., 2012, Galois Field in Cryptography
[5]
Boneh Dan, 2020, AFT '20: Proceedings of the 2nd ACM Conference on Advances in Financial Technologies, P12, DOI 10.1145/3419614.3423258
[6]
Cardano, 2021, MAK WORLD WORK BETT
[7]
Practical byzantine fault tolerance and proactive recovery
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
2002, 20 (04)
:398-461
[9]
Using algebraic signatures to check data possession in cloud storage
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2013, 29 (07)
:1709-1715
[10]
Dfinity, 2021, INT COMP