共 87 条
[1]
Chen X(2016)Verifiable computation over large database with incremental updates IEEE Trans Comput 65 3184-3195
[2]
Li J(2014)Big data: a survey Mob Netw Appl 19 171-209
[3]
Weng J(1983)On the security of public key protocols IEEE Tran Inf Theory 29 198-208
[4]
Ma J(2014)Data-intensive applications, challenges, techniques and technologies: a survey on big data Inf Sci 275 314-347
[5]
Lou W(2017)Big Data technologies: a survey J King Saud Univ Comput Inf Sci 56 78-85
[6]
Chen M(2018)SecSVA: secure storage, verification, and auditing of big data in the cloud environment IEEE Commun Mag 9 805-815
[7]
Mao S(2015)A privacy-aware authentication scheme for distributed mobile cloud computing services IEEE Syst J 68 74-88
[8]
Liu Y(2017)Provably secure authenticated key agreement scheme for distributed mobile cloud computing services Future Gener Comput Syst 9 4650-4666
[9]
Dolev D(2016)A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments Secur Commun Netw 19 59-67
[10]
Yao A(2017)An improved authentication protocol for distributed mobile cloud computing services Int J Crit Infrastruct Prot 68 320-330