Author:
Zhang Yuanyuan,Xiong Jinbo,Lin Mingwei,Wang Lili,Li Xuan
Publisher
Springer International Publishing
Reference22 articles.
1. Lecture Notes in Computer Science;M Bellare,2013
2. Blasco, J., Di Pietro, R., Orfila, A., et al.: A tunable proof of ownership scheme for deduplication using bloom filters. In: IEEE CNS, pp. 481–489. IEEE (2014)
3. Chen, R., Mu, Y., Yang, G., et al.: Bl-mle: Block-level message-locked encryption for secure large file deduplication. IEEE TIFS 10(12), 2643–2652 (2015)
4. Di Pietro, R., Sorniotti, A.: Boosting efficiency and security in proof of ownership for deduplication. In: ACM CCS, pp. 81–82. ACM (2012)
5. Fu, Z., Huang, F., Sun, X., et al.: Enabling semantic search based on conceptual graphs over encrypted outsourced data. In: IEEE TSC (2016)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献