Enhanced Trusted Third Party for Cyber Security in Multi Cloud Storage
暂无分享,去创建一个
[1] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[2] Josef Pieprzyk,et al. Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings , 2008, ASIACRYPT.
[3] Peng Ning,et al. Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings , 2009, ESORICS.
[4] Borja Sotomayor,et al. Virtual Infrastructure Management in Private and Hybrid Clouds , 2009, IEEE Internet Computing.
[5] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[6] L. Fortnow,et al. On the power of multi-power interactive protocols , 1988, [1988] Proceedings. Structure in Complexity Theory Third Annual Conference.
[7] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[8] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, ASIACRYPT.
[9] Gail-Joon Ahn,et al. Collaborative integrity verification in hybrid clouds , 2011, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).
[10] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[11] Stephen S. Yau,et al. Dynamic audit services for integrity verification of outsourced storages in clouds , 2011, SAC.
[12] Lance Fortnow,et al. On the Power of Multi-Prover Interactive Protocols , 1994, Theor. Comput. Sci..