共 30 条
[1]
Fu Z.J.(2015)Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing IEICE Trans. Commun. E98.B 190-200
[2]
Sun X.M.(2016)Enabling personalized search over encrypted outsourced data with efficiency improvement IEEE Trans. Parall. Distrib. Syst. 27 2546-2559
[3]
Liu Q.(2014)A variable threshold-value authentication architecture for wireless mesh networks J. Intern. Technol. 15 929-935
[4]
Fu Z.J.(2016)Privacy-preserving public auditing protocol for low performance end devices in cloud IEEE Trans. Inform. Forens. Secur. 11 2572-2583
[5]
Ren K.(2016)Fine-grained two-factor access control for web-based cloud computing services IEEE Trans. Inform. Forens. Secur. 11 484-497
[6]
Shu J.G.(2015)Mutual verifiable provable data auditing in public cloud storage J. Intern. Technol. 16 317-323
[7]
Guo P.(2008)Compact proofs of retrievability LNCS 5350 90-107
[8]
Wang J.(2013)Compact proofs of retrievability J. Cryptol. 26 442-483
[9]
Geng X.H.(2014)NaEPASC: a novel and efficient public auditing scheme for cloud data J. Zhejiang Univ.-Sci. C (Comput. & Electron.) 15 794-804
[10]
Li J.T.(2013)Privacypreserving public auditing for secure cloud storage IEEE Trans. Comput. 62 362-375