共 18 条
[1]
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[2]
Aljumah A, 2018, 2018 7TH INTERNATIONAL CONFERENCE ON COMPUTERS COMMUNICATIONS AND CONTROL (ICCCC 2018), P237, DOI 10.1109/ICCCC.2018.8390464
[3]
[Anonymous], 2019, SECUR COMMUN NETW, V2019
[4]
[Anonymous], 2005, EFFICIENT CONTENT AU
[5]
Blomer J., 1999, Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, P711, DOI 10.1145/301250.301441
[6]
Foundations and Evolution of Modern Computing Paradigms: Cloud, IoT, Edge, and Fog
[J].
IEEE ACCESS,
2019, 7
:150936-150948
[7]
Efficient identity based signature schemes based on pairings
[J].
SELECTED AREAS IN CRYPTOGRAPHY,
2003, 2595
:310-324
[8]
Secure Cloud Storage Service Using Bloom Filters for the Internet of Things
[J].
IEEE ACCESS,
2019, 7
:60897-60907
[9]
L'Ecuyer P., 1994, Annals of Operations Research, V53, P77, DOI 10.1007/BF02136827
[10]
ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability
[J].
2017 17TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID),
2017,
:468-477