1. Bauer, S., Priyantha, N.B.: Secure data deletion for Linux file systems. In: Proceedings of the 10th Conference on USENIX Security Symposium, vol. 174, pp. 153–164. USENIX Association, Berkeley (2001)
2. Boneh, D., Lipton, R.: A revocable backup system. In: Proceedings of the 6th Conference on USENIX Security Symposium, vol. 6, pp. 91–96. USENIX Association, Berkeley (1996)
3. Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. IEEE Trans. Parallel Distrib. Syst. 25(9), 2386–2396 (2014)
4. Chen, X., Li, J., Huang, X., Li, J., Xiang, Y., Wong, D.: Secure outsourced attribute-based signatures. IEEE Trans. Parallel Distrib. Syst. 25(12), 3285–3294 (2014)
5. Chen, X., Huang, X., Li, J., Ma, J., Lou, W., Wong, D.: New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans. Inf. Forensics Secur. 10(1), 69–78 (2015)