1 |
Einar M , Maithili N , Gene T . Authentication and integrity in outsourced databases. ACM Transactions on Storage, 2006, 2 (2):107~138
|
2 |
Ateniese G , Burns R , Curtmola R , et al. Provable Data Possession at Untrusted Stores. Cryptology ePrint Archive, Report 2007/202, 2007
|
3 |
Ateniese G , Pietro R D , Mancini L V , et al. Scalable and efficient provable data possession. Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, Istanbul, Turkey, ACM, 2008
|
4 |
Juels A , Kaliski B . Pors: proofs of retrievability for large files. Proceedings of CCS 2007, Alexandria, VA, USA, 2007: 584~597
|
5 |
Erway C , Kupcu A , Papamanthou C , et al. Dynamic Provable Data Possession. Cryptology ePrint Archive,Report 2008/432, 2008
|
6 |
Wang Q , Wang C , Li J , et al. Enabling public verifiability and data dynamics for storage security in cloud computing. Lecture Notes in Computer Science, 2009 (5789):355~370
|
7 |
Wang Q , Wang C , Ren K , et al. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 2011, 22 (5):847~859
|
8 |
Shah M A , Baker M , Mogul J C , et al. Auditing to keep online storage services honest. Proceedings of HotOS'07, Berkeley, CA, USENIX, 2007: 1~6
|
9 |
Cao N , Yang Z Y , Wang C , et al. Privacy-preserving public auditing for data storage security in cloud computing. Proceedings of IEEE INFOCOM 2010, San Diego,CA, 2010: 525~533
|
10 |
Shacham H , Waters B . Compact proofs of retrievability. Proceedings of ASIACRYPT 2008, Melbourne, Australia, 2008: 90~107
|
11 |
Sebe F , Domingo-Ferrer J , Balleste A M , et al. Efficient remote data possession checking in critical information infrastructures. IEEE Transactions on Knowledge and Data English, 2008: 1034~1038
|
12 |
Wang C , Wang Q , Ren K , et al. Ensuring data storage security in cloud computing. Proceedings of IW QoS 2009, Charleston, South Carolina, USA, 2009
|
13 |
Bowers K D , Juels A , Oprea A . Proofs of retrievability: theory and implementation. Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer and Communications Security Conference, New York, 2009:43~54
|
14 |
Kamara S , Lauter K . Cryptographic cloud storage. Lecture Notes in Computer Science, Financial Cryptography and Data Security, Berlin, Springer, 2010: 136~149
|
15 |
Hao Z , Yu N . A multiple-replica remote data possession checking protocol with public verifiability. Proceedings of Second Intˊ1 Data, Privacy and E-Commerce Sympoisum(ISDPE′10), New York, USA, 2010
|
16 |
Zheng Q , Xu S . Fair and dynamic proofs of retrievability. Proceedings of 1st ACMM Conference on Data and Application Security and Privacy(CODASPY), San Antonio, TX, USA, 2011
|
17 |
Wu Q , Mu Y , Susilo W , et al.Joux A(ed) Asymmetric group key agreement. EUROCRYPT 2009, Springer, Heidelberg, 2009:153~170
|
18 |
Goldwasser S , Micali S , Rivest R . A digital signature scheme secure against adaptive chosen-message attacks, SIAM J Computing, 1988, 17(2):281~308
|
19 |
Chaum D , Pederson P T .E F Brichell(ed) Wallet databases with observers. Advances in Cryptology-CRYPTO'92,LNCS 740, 1993: 89~105
|