共 17 条
[1]
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[2]
Bowers K.D., 2009, Workshop on Cloud computing Security (CCSW), P43, DOI DOI 10.1145/1655008.1655015
[3]
Chang EC, 2008, LECT NOTES COMPUT SC, V5283, P223
[6]
Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584
[8]
On Deletion of Outsourced Data in Cloud Computing
[J].
2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD),
2014,
:344-351
[9]
Enabling Non-repudiable Data Possession Verification in Cloud Storage Systems
[J].
2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD),
2014,
:232-239