共 18 条
[1]
[Anonymous], 2013, P INT WORKSH SEC CLO, DOI DOI 10.1145/2484402.2484408
[2]
Ateniese G., 2008, P 4 INT C SEC PRIV C, P1, DOI 10.1145/1460877.1460889
[3]
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[4]
Bellare M, 2013, P 22 USENIX C SEC, P179, DOI DOI 10.1109/MPRV.2013.43
[6]
Dodis Y, 2009, LECT NOTES COMPUT SC, V5444, P109
[7]
Dworkin M., 2001, SP80038A NIST
[8]
Erway CC, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P213
[9]
Gantz J., 2010, IDC925
[10]
Proofs of Ownership in Remote Storage Systems
[J].
PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11),
2011,
:491-500