Publisher
Springer International Publishing
Reference22 articles.
1. Lecture Notes in Computer Science;D Apon,2014
2. Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X.: Provable data possession at untrusted stores. In: ACM Conference on Computer and Communications Security, pp. 598–609 (2007)
3. Ateniese, G., Dagdelen, Ö., Damgård, I., Venturi, D.: Entangled cloud storage. Future Gener. Comput. Syst. 62, 104–118 (2016)
4. Badertscher, C., Maurer, U.: Composable and robust outsourced storage. Cryptology ePrint Archive, Report 2017/133 (2017).
https://eprint.iacr.org/2017/133
. Full version of this paper
5. Blum, M., Evans, W.S., Gemmell, P., Kannan, S., Naor, M.: Checking the correctness of memories. Algorithmica 12(2/3), 225–244 (1994)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献