共 56 条
- [1] Abdalla M, 2000, LECT NOTES COMPUT SC, V1976, P116
- [2] Safekeeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges [J]. IMF 2009: 5TH INTERNATIONAL CONFERENCE ON IT SECURITY INCIDENT MANAGEMENT AND IT FORENSIC, 2009, : 94 - 110
- [3] [Anonymous], 2013, P INT WORKSH SEC CLO, DOI DOI 10.1145/2484402.2484408
- [4] [Anonymous], 2009, NIST DEFINITION CLOU
- [5] [Anonymous], 2013, IEEE T COMPUT, DOI DOI 10.1109/TC.2011.245
- [6] [Anonymous], 1997, Technical Report
- [7] [Anonymous], 2014, SHA3 NAT I STAND TEC
- [8] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
- [9] Bellare M., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P431
- [10] Birk D., 2011, P 6 IEEE INT WORKSHO, P1