共 41 条
[1]
Homomorphic Authentication Based on Rank-Based Merkle Hash Tree
[J].
ADVANCES IN INTERNET, DATA & WEB TECHNOLOGIES,
2018, 17
:841-848
[4]
Boneh D, 1996, PROCEEDINGS OF THE SIXTH ANNUAL USENIX SECURITY SYMPOSIUM: FOCUSING ON APPLICATIONS OF CRYPTOGRAPHY, P91
[5]
Changsong Yang, 2018, Information and Communications Security. 20th International Conference, ICICS 2018. Proceedings: Lecture Notes in Computer Science (LNCS 11149), P445, DOI 10.1007/978-3-030-01950-1_26
[8]
An Associated Deletion Scheme for Multi-copy in Cloud Storage
[J].
ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV,
2018, 11337
:511-526
[10]
Guan ZL, 2010, PROCEEDINGS OF THE 2010 INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENCE AND AWARENESS INTERNET, AIAI2010, P269, DOI 10.1049/cp.2010.0767