Remote Data Authentication Scheme Based Balance Binary Sort Merkle Hash Tree
暂无分享,去创建一个
Yang Li | Xuanxia Yao | Meiliang Liu | Mengyu Shen | Delgerbat Batbayar | Y. Li | Xuanxia Yao | Mengyu Shen | Meiliang Liu | Delgerbat Batbayar
[1] Huaqun Wang,et al. Proxy Provable Data Possession in Public Clouds , 2013, IEEE Transactions on Services Computing.
[2] Yi Mu,et al. On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage , 2014, IEEE Transactions on Parallel and Distributed Systems.
[3] Yao Ge,et al. LBT-based cloud data integrity verification scheme , 2016 .
[4] Xuemin Shen,et al. An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid , 2014, IEEE Systems Journal.
[5] Li Zhou-ju. An Improved Data Integrity Verification Scheme in Cloud Storage System , 2014 .
[6] Xizhao Wang,et al. An On-line Multi-CBR Agent Dispatching Algorithm , 2006, Soft Comput..
[7] Yang Qiu-xiang. Remote attestation mechanism of platform configuration based on dynamic Huffman tree , 2012 .
[8] Jinjun Chen,et al. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates , 2014, IEEE Transactions on Parallel and Distributed Systems.
[9] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[10] Alexis Bonnecaze,et al. New models for efficient authenticated dictionaries , 2015, Comput. Secur..
[11] Yihua Zhang,et al. Efficient Dynamic Provable Possession of Remote Data via Update Trees , 2016, TOS.
[12] Reza Curtmola,et al. Remote data checking using provable data possession , 2011, TSEC.
[13] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[14] Teng Li,et al. A position-aware Merkle tree for dynamic cloud data integrity verification , 2015, Soft Computing.
[15] Jing Zou,et al. Dynamic Provable Data Possession Based on Ranked Merkle Hash Tree , 2016, 2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI).
[16] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[17] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[18] Cong Wang,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[19] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[20] David Hutchison,et al. A survey of key management for secure group communication , 2003, CSUR.
[21] Tan Shuan,et al. Research and Development of Provable Data Integrity in Cloud Storage , 2015 .
[22] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[23] Xiaofeng Liao,et al. A Novel Privacy-Preserving Data Integrity Verification by Partial Delegation , 2018, 2018 Eighth International Conference on Information Science and Technology (ICIST).
[24] David Cash,et al. Dynamic Proofs of Retrievability via Oblivious RAM , 2013, EUROCRYPT.
[25] Li Hui,et al. Secure and Privacy-Preserving Data Storage Service in Public Cloud , 2014 .