Provably Secure Identity Based Provable Data Possession
暂无分享,去创建一个
Yi Mu | Yong Yu | Willy Susilo | Hongyu Liu | Yafang Zhang | Y. Mu | W. Susilo | Yong Yu | Hongyu Liu | Yafang Zhang
[1] Jin Li,et al. Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.
[2] Gail-Joon Ahn,et al. Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage , 2012, IEEE Transactions on Parallel and Distributed Systems.
[3] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[4] Elisa Bertino,et al. Private Searching on Streaming Data Based on Keyword Frequency , 2014, IEEE Transactions on Dependable and Secure Computing.
[5] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[6] Hui Li,et al. Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud , 2015, IEEE Transactions on Services Computing.
[7] Huaqun Wang,et al. On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage , 2014, IEEE Transactions on Parallel and Distributed Systems.
[8] Xiaohua Jia,et al. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.
[9] Huaqun Wang,et al. Identity-Based Distributed Provable Data Possession in Multicloud Storage , 2015, IEEE Transactions on Services Computing.
[10] Reza Curtmola,et al. Remote data checking using provable data possession , 2011, TSEC.
[11] Yi Mu,et al. Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage , 2014, International Journal of Information Security.
[12] Ninghui Li,et al. Introduction to special section SACMAT'08 , 2011, TSEC.
[13] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[14] Duncan S. Wong,et al. Secure Outsourced Attribute-Based Signatures , 2014, IEEE Transactions on Parallel and Distributed Systems.
[15] Javier Herranz,et al. On the Generic Construction of Identity-Based Signatures with Additional Properties , 2006, ASIACRYPT.
[16] Xiaogang Wang,et al. Dynamic cloud service selection using an adaptive learning mechanism in multi-cloud computing , 2015, J. Syst. Softw..
[17] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[18] Stefan Lier,et al. Business Models and Product Service Systems for Transformable, Modular Plants in the Chemical Process Industry , 2013 .
[19] Hua Wang,et al. Improved security of a dynamic remote data possession checking protocol for cloud storage , 2014, Expert Syst. Appl..
[20] Cong Wang,et al. Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.
[21] Hui Li,et al. Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud , 2015, IEEE Transactions on Services Computing.
[22] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[23] Yi Mu,et al. Comments on a Public Auditing Mechanism for Shared Cloud Data Service , 2015, IEEE Transactions on Services Computing.
[24] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[25] Stephen S. Yau,et al. Efficient audit service outsourcing for data integrity in clouds , 2012, J. Syst. Softw..
[26] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[27] Chanathip Namprempre,et al. Security Proofs for Identity-Based Identification and Signature Schemes , 2004, EUROCRYPT.
[28] Yong Yu,et al. Remote data possession checking with enhanced security for cloud storage , 2015, Future Gener. Comput. Syst..