共 32 条
[1]
Ade-Ibijola A. O., 2012, Int. J. Comput. Appl., V54, P24
[2]
Ateniese G., 2008, P 4 INT C SEC PRIV C, P1, DOI 10.1145/1460877.1460889
[3]
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[5]
Barsoum A. F., 2011, IACR Cryptol. ePrint Arch., V2011, P447
[9]
Using algebraic signatures to check data possession in cloud storage
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2013, 29 (07)
:1709-1715
[10]
Demchenko Y., 2013, P WORKSH SEC DAT MAN, P76