A cloud computing security schemes:- TGOS [Threshold group-oriented signature] and TMS [Threshold multisignature schemes]
暂无分享,去创建一个
[1] Claus-Peter Schnorr,et al. Fast Signature Generation With a Fiat Shamir-Like Scheme , 1991, EUROCRYPT.
[2] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[3] Chin-Chen Chang,et al. Generalization of Threshold Signature and Authenticated Encryption for Group Communications , 2000 .
[4] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[5] Mary Baker,et al. Auditing to Keep Online Storage Services Honest , 2007, HotOS.
[6] Stefan Berger,et al. TVDc: managing security in the trusted virtual datacenter , 2008, OPSR.
[7] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[8] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[9] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[10] Richard Wolski,et al. The Eucalyptus Open-Source Cloud-Computing System , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.