Remote data integrity check for remotely acquired and stored stream data
暂无分享,去创建一个
[1] Jia Xu,et al. Remote Integrity Check with Dishonest Storage Server , 2008, ESORICS.
[2] Yi Mu,et al. Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage , 2014, International Journal of Information Security.
[3] Dieter Gollmann,et al. Computer Security , 1979, Lecture Notes in Computer Science.
[4] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[5] M. Phil,et al. PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING , 2015 .
[6] Yi Mu,et al. On Indistinguishability in Remote Data Integrity Checking , 2015, Comput. J..
[7] Reza Curtmola,et al. Remote data checking for network coding-based distributed storage systems , 2010, CCSW '10.
[8] Reza Curtmola,et al. MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[9] Shriniwas Gadage,et al. Cooperative Provable Data possession for integrity verification in multicloud , 2015 .
[10] Reza Curtmola,et al. Remote data checking using provable data possession , 2011, TSEC.
[11] A. Menezes. An Introduction to Pairing-Based Cryptography , 2005 .
[12] Ninghui Li,et al. Introduction to special section SACMAT'08 , 2011, TSEC.
[13] Jean-Jacques Quisquater,et al. Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers , 2003, IICIS.
[14] William Stallings,et al. Cryptography and network security , 1998 .
[15] Allen Roginsky,et al. Report on Pairing-based Cryptography , 2015, Journal of research of the National Institute of Standards and Technology.
[16] Josep Domingo-Ferrer,et al. Efficient Remote Data Possession Checking in Critical Information Infrastructures , 2008, IEEE Transactions on Knowledge and Data Engineering.
[17] Hong Jiang,et al. Full integrity and freshness for cloud data , 2018, Future Gener. Comput. Syst..
[18] A. S. Poornima,et al. A Survey on Data Integrity Methods in Cloud Storage , 2016, European Journal of Engineering and Technology Research.
[19] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[20] Ratna Dutta,et al. Pairing-based cryptography : A survey , 2004 .
[21] T. Sander,et al. Audit-log integrity using redactable signatures with pseudonyms , 2006 .
[22] Paulo S. L. M. Barreto,et al. Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..
[23] Nenghai Yu,et al. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.