共 62 条
[11]
Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures
[J].
PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II,
2017, 10175
:152-182
[12]
Dynamic secure cloud storage with provenance
[J].
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
2012, 6805 LNCS
:442-464
[13]
Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-B ased
[J].
26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019),
2019,
[14]
FairSwap: How to Fairly Exchange Digital Goods
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:967-984
[15]
SciBlock: A Blockchain-Based Tamper-Proof Non-Repudiable Storage for Scientific Workflow Provenance
[J].
2019 IEEE 5TH INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC 2019),
2019,
:81-90
[16]
Gionis A, 1999, PROCEEDINGS OF THE TWENTY-FIFTH INTERNATIONAL CONFERENCE ON VERY LARGE DATA BASES, P518
[17]
Google, Leveldb
[19]
Hasan R, 2007, STORAGE SS'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON STORAGE SECURITY AND SURVIVABILITY, P13
[20]
A survey on provenance: What for? What form? What from?
[J].
VLDB JOURNAL,
2017, 26 (06)
:881-906