Author:
Tian Miaomiao,Ye Shibei,Zhong Hong,Wang Lingyan,Chen Fei,Cui Jie
Publisher
Springer International Publishing
Reference38 articles.
1. Ateniese, G., et al.: Provable data possession at untrusted stores. In: ACM Conference on Computer and Communications Security, pp. 598–609. ACM (2007)
2. Ateniese, G., Di Pietro, R., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: International Conference on Security and Privacy in Communication Networks, p. 9. ACM (2008)
3. Lecture Notes in Computer Science;G Ateniese,2009
4. Babcock, C.: 9 worst cloud security threats (2014). http://www.informationweek.com/cloud/infrastructure-as-a-service/9-worst-cloud-security-threats/d/d-id/1114085
5. Lecture Notes in Computer Science;F Bao,2003
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献