共 36 条
[1]
[Anonymous], 2008, P 4 INT C SEC PRIV C, DOI 10.1145/1460877.1460889
[2]
[Anonymous], 2005, INT J INF SECUR, DOI DOI 10.1007/S10207-005-0070-3
[3]
Atallah M.J., 2010, Proc. ACM Symp. on Information, P48, DOI DOI 10.1145/1755688.1755695
[4]
Atallah MJ, 2001, ADV COMPUT, V54, P215
[5]
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[6]
Private and Cheating-Free Outsourcing of Algebraic Computations
[J].
SIXTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PROCEEDINGS,
2008,
:240-245
[7]
Chaum D., 1993, Advances in Cryptology - CRYPTO '92. 12th Annual International Cryptology Conference Proceedings, P89
[9]
Chevallier-Mames B, 2010, LECT NOTES COMPUT SC, V6035, P24, DOI 10.1007/978-3-642-12510-2_3
[10]
MR-PDP: Multiple-Replica Provable Data Possession
[J].
28TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, VOLS 1 AND 2, PROCEEDINGS,
2008,
:411-+