Computer Science ›› 2016, Vol. 43 ›› Issue (Z6): 370-373.doi: 10.11896/j.issn.1002-137X.2016.6A.088
Previous Articles Next Articles
WANG Hui-qing and ZHOU Lei
[1] 陈兰香.一种基于同态Hash的数据持有性证明方法.电子与信息学[J].2011,3(9):2200-2204 [2] Ateniese G,Berns R,Cutmola R,et al.Provable Data Possession at Untrusted Stores[C]∥Proc of the 14th ACM Conference on Computer and Communications Security.New York:ACM,2007:598-609 [3] Ateniese G,Pietro ,R D,Mancini L V,et al.Scalable and Efficient Provable Data Possessin[C]∥Proc of the 4th International Conference on Security and Privacy in Communication Netowrks Istanbul.Turkey:ACM,2008:1-10 [4] Erway C,Kupcu A,Papamanthou C,et al.Dynamic ProvableData Possession[C]∥Proc of the16thACM Conferenceon Computer andCommunications Security.Chicago,Illinois,USA:ACM,2009:213-222 [5] Wang Q,Wang C,Li J,et al.Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing[C]∥Proc of the14thEuropean Conferenceon on Research in Computer Security.Heidelberg,Berlin,2009:355-370 [6] Hao Z,Zhong S,Yu N.A Privacy-preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability[J].IEEE Transactions on Knowledge and Data Engineering,2011,23(9):1432 [7] Curtmola R,Khan O,Burns R,et al.Multiple-Replica Provable Data Possession [C]∥28thIEEE ICDCS.2008:411-420 [8] Barsoum A F,Hasan M A.On Verifying Dynamic Multiple Data Copies over Cloud Servers [R].Cryptology ePrint Archive,2011:447 [9] Damgard I,Ren K,Lou W,et al.Toward Publicly Auditable Secure Cloud Data Storage Services[J].IEEE Network,2011,4:19-24 [10] Wang C,Jurki M.A Simplification and some Application of Paillier’s Probabilistic Public Key System [C]∥4thInternation Workshop on Practice and Theory in Public Key Cryptosystems.2001:13-15 [11] 于洋洋,虞慧群,范贵生.一种云存储数据完整性验证方法[J].华东理工大学学报(自然科学版),2013,9(2):211-216 [12] 胡德敏,余星.一种基于同态标签的动态云存储数据完整性验证方法[J].计算机应用研究,2014,1(5):1362-1365 [13] Chen L,Guo G.An Efficient Remote Data Possession Checking in Cloud Storage[J].International Journal of Digital Content Technology and its Applications,2011,5(4):43-50 |
No related articles found! |
|