Author:
Rangasamy Jothi,Kuppusamy Lakshmi
Publisher
Springer International Publishing
Reference25 articles.
1. Abadi, M., Feigenbaum, J., Kilian, J.: On hiding information from an oracle. In: Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing (STOC 1987), pp 195–203. ACM (1987).
https://doi.org/10.1145/28395.28417
2. Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 598–609. ACM, New York (2007).
https://doi.org/10.1145/1315245.1315318
3. Bowers, K.D., Juels, A., Oprea, A.: Proofs of retrievability: theory and implementation. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, pp. 43–54. ACM, New York (2009).
https://doi.org/10.1145/1655008.1655015
4. Lecture Notes in Computer Science;V Boyko,1998
5. Cai, J., Ren, Y., Huang, C.: Verifiable outsourcing computation of modular exponentiations with single server. Int. J. Network Secur. 19(3), 449–457 (2017).
http://ijns.jalaxy.com.tw/download_paper.jsp?PaperID=IJNS-2015-12-05-1&PaperName=ijns-v19-n3/ijns-2017-v19-n3-p449-457.pdf
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献