Author:
Campanelli Matteo,Fiore Dario,Greco Nicola,Kolonelos Dimitris,Nizzardo Luca
Publisher
Springer International Publishing
Reference32 articles.
1. Ateniese, R.C., et al.: Provable data possession at untrusted stores. In: Ning, P., De Capitani di Vimercati, S., Syverson, P.F. (eds.) ACM CCS 2007, pp. 598–609. ACM Press, October 2007
2. Boneh, D., Bünz, B., Fisch, B.: A Survey of Two Verifiable Delay Functions. Cryptology ePrint Archive, Report 2018/712 (2018). https://eprint.iacr.org/2018/712
3. Lecture Notes in Computer Science;D Boneh,2019
4. Lecture Notes in Computer Science;J Benaloh,1994
5. Lecture Notes in Computer Science;K Brogle,2012
Cited by
38 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献