Number 10
暂无分享,去创建一个
Faiz F. Areed | Amr M. T. Ali-Eldin | J. Li | X. Chen | M. Li | P. Lee | Y. Tzou | A. M. Ahmed | M. Elksasy | Chunfeng Li | Yu Weibo | Tang | Wusheng quotStudy | Cheng Chen | Yen-Chuan Chang | Teng-Tiow Iven Mareels | John Moore
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Alfredo De Santis,et al. Multiple ramp schemes , 1999, IEEE Trans. Inf. Theory.
[3] Marvin Theimer,et al. Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[4] Yongdae Kim,et al. On protecting integrity and confidentiality of cryptographic file system for outsourced storage , 2009, CCSW '09.
[5] Bharat K. Bhargava,et al. Secure and efficient access to outsourced data , 2009, CCSW '09.
[6] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[7] Benny Pinkas,et al. Side Channels in Cloud Services: Deduplication in Cloud Storage , 2010, IEEE Security & Privacy.
[8] Edgar R. Weippl,et al. Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space , 2011, USENIX Security Symposium.
[9] Benny Pinkas,et al. Proofs of ownership in remote storage systems , 2011, CCS '11.
[10] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[11] John Gantz,et al. The Digital Universe in 2020: Big Data, Bigger Digital Shadows, and Biggest Growth in the Far East , 2012 .
[12] Mihir Bellare,et al. Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.
[13] Jin Li,et al. Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.
[14] Mr. R. NavinKumar,et al. Secure Deduplication with Efficient and Reliable Convergent Key Management , 2018 .