共 56 条
- [11] Using algebraic signatures to check data possession in cloud storage[J]. Chen, Lanxiang. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013(07)
- [12] The Growing Pains of Cloud Storage[J]. Chen, Yih-Farn Robin. IEEE INTERNET COMPUTING, 2015(01)
- [13] Network forensics analysis[J]. Corey, V;Peterman, C;Shearin, S;Greenberg, MS;Van Bokkelen, J. IEEE INTERNET COMPUTING, 2002(06)
- [14] Crosby S. A., 2009, USENIX SECURITY S, P317
- [15] Dewan H., 2011, Proceedings of the 2011 IEEE World Congress on Services (SERVICES 2011), P224, DOI 10.1109/SERVICES.2011.43
- [16] Dixon PD, 2005, IEEE POTENTIALS, V24, P7, DOI 10.1109/MP.2005.1594001
- [17] Erway CC, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P213
- [18] Proofs of Ownership in Remote Storage Systems[J]. Halevi, Shai;Harnik, Danny;Pinkas, Benny;shulman-peleg, Alexandra. PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011
- [19] HOLT J.E., 2006, 2006 AUSTRALASIAN WO, V54, P203
- [20] Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584