MF-PDP: Multi-function provable data possession scheme in cloud computing
暂无分享,去创建一个
[1] Mihir Bellare,et al. The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols , 2004, CRYPTO.
[2] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[3] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[4] Cong Wang,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[5] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[6] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[7] Zoe L. Jiang,et al. Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013, IEEE Transactions on Computers.
[8] X. U. Chun-xiang,et al. Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud Computing , 2012, IACR Cryptol. ePrint Arch..
[9] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[10] Yalin Chen,et al. Crypto-analyses on "secure and efficient privacy-preserving public auditing scheme for cloud storage" , 2014, IACR Cryptol. ePrint Arch..
[11] Nenghai Yu,et al. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.
[12] Reza Curtmola,et al. Robust Dynamic Provable Data Possession , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[13] Gary L. Miller,et al. Riemann's Hypothesis and tests for primality , 1975, STOC.
[14] R. Subramanian,et al. RSA-based dynamic public audit service for integrity verification of data storage in cloud computing using Sobol sequence , 2012, Int. J. Cloud Comput..
[15] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[16] Stephen S. Yau,et al. Efficient provable data possession for hybrid clouds , 2010, CCS '10.
[17] Dong Hoon Lee,et al. PKIS: practical keyword index search on cloud datacenter , 2011, EURASIP J. Wirel. Commun. Netw..
[18] Chunxiang Xu,et al. Cryptanalysis of Wang's Auditing Protocol for Data Storage Security in Cloud Computing , 2012, ICICA.
[19] Josep Domingo-Ferrer,et al. Efficient Remote Data Possession Checking in Critical Information Infrastructures , 2008, IEEE Transactions on Knowledge and Data Engineering.