共 32 条
[1]
Atallah M.J., 2005, P ACM C COMPUTER COM, P190
[2]
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[3]
Ateniese G., 2008, P 4 EAI SECURECOMM, P1, DOI 10.1145/1460877.1460889
[4]
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[5]
Backes M, 2006, LECT NOTES COMPUT SC, V4189, P327
[6]
Barreto P.S.L.M., 2006, P13633 IEEE STAND AS
[7]
Barreto PSLM, 2006, LECT NOTES COMPUT SC, V3897, P319
[8]
Barsoum A.F., 2010, Provable Possession and Replication of Data over Cloud Servers
[9]
Barsoum A. F., 2011, IACR Cryptol. ePrint Arch., V2011, P447
[10]
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122