[1] |
汪来富, 沈军, 金华敏 . 云计算应用安全研究[J]. 电信科学, 2010,26(6): 67-70.
|
|
WANG L F , SHEN J , JIN H M . Research on application security of cloud computing[J]. Telecommunications Science, 2010,26(6): 67-70.
|
[2] |
何明, 郑翔, 赖海光 ,等. 云计算技术发展及应用探讨[J]. 电信科学, 2010,26(5): 42-46.
|
|
HE M , ZHENG X , LAI H G ,et al. Development and application of cloud computing technology[J]. Telecommunications Science, 2010,26(5): 42-46.
|
[3] |
REN K , WANG C , WANG Q . Security challenges for the public cloud[J]. IEEE Internet Computing, 2012,16(1): 69-73.
|
[4] |
MEZGAR I , RAUSCHECKER U . The challenge of networked enterprises for cloud computing interoperability[J]. Computers in Industry, 2014,65(4): 657-674.
|
[5] |
陈克非, 翁健 . 云计算环境下数据安全与隐私保护[J]. 杭州师范大学学报(自然科学版), 2014(6): 561-570.
|
|
CHEN K F , WEN J . Data security and privacy protection in cloud computing environment[J]. Journal of Hangzhou Normal University (Natural Science Edition), 2014(6): 561-570.
|
[6] |
何明 . 云计算在公安电子数据取证技术中的研究与应用[J]. 网络安全技术与应用, 2015(7): 88-90.
|
|
HE M . Research and application of cloud computing in police electronic data forensics[J]. Network Security Technology and Application, 2015(7): 88-90.
|
[7] |
农卫涛 . 云计算在公安信息化建设中的应用[J]. 数字通信世界, 2016(1): 97,103.
|
|
NONG W T . Application of cloud computing in police information construction[J]. Digital Communications World, 2016(1): 97,103.
|
[8] |
CHAUM D , PEDERSEN T P . Wallet databases with observers[C]// International Cryptology Conference on Advances in Cryptology,August 16-20,1992, London,UK.[S.l.:s.n] 1992: 89-105.
|
[9] |
HOHENBERGER S , LYSYANSKAYA A . How to securely outsource cryptographic computations[J]. Theory of Cryptography, 2005(3378): 264-282.
|
[10] |
CHEN X , LI J , MA J ,et al. New algorithms for secure outsourcing of modular exponentiations[J]. IEEE Transactions on Parallel & Distributed Systems, 2014,25(9): 2386-2396.
|
[11] |
YE J , CHEN X , MA J . An improved algorithm for secure outsourcing of modular exponentiations[C]// IEEE International Conference on Advanced Information Networking and Applications Workshops,March 24-27,2015,Gwangiu,South Korea. Piscataway:IEEE Press, 2015: 73-76.
|
[12] |
DIJK M , CLARKE D , GASSEND B ,et al. Speeding up exponentiation using an untrusted computational resource[J]. Designs Codes & Cryptography, 2006,39(2): 253-273.
|
[13] |
WANG Y , WU Q , WONG D S ,et al. Securely outsourcing exponentiations with single untrusted program for cloud storage[C]// European Symposium on Research in Computer Security,September 7-11,2014,Wroclaw,Poland.[S.l.:s.n], 2014: 326-343.
|
[14] |
BOYKO V , PEINADO M , VENKATESAN R . Speeding up discrete log and factoring based schemes via precomputations[C]// International Conference on the Theory and Applications of Cryptographic Techniques,May 31-June 4,1998,Espoo,Finland.[S.l.:s.n] 1998: 221-235.
|