Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing
暂无分享,去创建一个
Fagen Li | Chunxiang Xu | Wenzheng Zhang | Jining Zhao | Chunxiang Xu | Fagen Li | Wenzheng Zhang | Jining Zhao
[1] Chanathip Namprempre,et al. Security Proofs for Identity-Based Identification and Signature Schemes , 2004, EUROCRYPT.
[2] Xavier Boyen,et al. Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.
[3] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[4] Jean-Jacques Quisquater,et al. Identity Based Undeniable Signatures , 2004, CT-RSA.
[5] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[6] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[7] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[8] Cong Wang,et al. Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[9] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[10] M. Roberts Masillamani,et al. Design and auditing of Cloud computing security , 2010, 2010 Fifth International Conference on Information and Automation for Sustainability.
[11] Nabil Ahmed Sultan,et al. International Journal of Information Management , 2010 .
[12] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.