Computer Science ›› 2014, Vol. 41 ›› Issue (5): 137-142.doi: 10.11896/j.issn.1002-137X.2014.05.030
Previous Articles Next Articles
SUN Xin-wei,ZHANG Wei and XU Tao
[1] Cloud storage [EB/OL].http://en.wikipedia.org/wiki/Cloud_stroage,2012-5-10 [2] 傅颖勋,罗圣美,舒继武.安全云存储系统与关键技术综述[J].计算机研究与发展,2013,50(1) [3] Cloud computing [EB/OL].http://en.wikipedia.org/wiki/Cloud_computing,2012-5-10 [4] Twinstrara [EB/OL].http://twinstrara.com,2012-05-10 [5] 侯清铧,武永卫,郑纬民,等.一种保护云存储平台上用户数据私密性的方法[J].计算机研究与发展,2011,48(7) [6] Amazon simple storage service [EB/OL].http://aws.amazon.com/s3,2012-05-10 [7] Using Data Encryption[EB/OL].http://docs.aws.amazon.com/AmazonS3/latest/dev/UsingEncryption.html,2006-3-1 [8] Shraer A,Cachin C,Cidon A,et al.Venus:Verification for untrusted cloud storage [C]∥Proc of the 2010ACM Workshop on Cloud Computing Security Workshop.New York:ACM,2010:19-30 [9] iCloud:iCloud安全性与隐私政策概览[EB/OL].http://support.apple.com/kb/HT4865?viewlocale=zh_CN&locale=zh_CN,2013-2-11 [10] Alani D M M.DES96-Improved DES Security[C]∥20107th International Multi-Conference on Systems Signals and Devices(SSD).Amman,2010:1-4 [11] Shao Jun-xiang,He Zhi-min.High-speed implementation of3DES encryption algorithm based on FPGA[C]∥ Modern electronic technology.2004 [12] Kelsey J,Schneier B,Wagner D.Key Schedule Cryptanalysis of IDEA,G-DES,Gost,Softer and Triple DES[M].Springer Verlag,1997 [13] NIST Advanced Encryption Standard (AES).Development Effort web site http://csrs.nist.gov/encryption/aes/aes-home.htm [14] Daemen J,Rijmen V.AES Proposal:Rijndael Version 2[EB/OL].http://www.east.kuleuven.ac.be/~rijmen/rijndael,1999-10-05 [15] Rivest R,Shamir A,Aldeman L.A Methoed for Obtaining DigitalSignatures and Public-key Cryptosystems[J].J.Communications of the ACM,1978,21(2):120-126 [16] Shimizu Y,Nuno F.Performance Evaluation of Novel DSAScheme that combines Polling Method with Random Access Method[C]∥PIMRC’ 06.Helsinki,Finland,Sept.2006 |
No related articles found! |
|