Funder
National Natural Science Foundation of China
The Priority Academic Program Development of Jiangsu Higer Education Institutions
Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology
The Education Program for Innovation Entrepreneurship for Southwest Jiaotong University
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering
Reference37 articles.
1. Ren, K., Wang, C., & Wang, Q. (2012). Security challenges for the public cloud. IEEE Internet Computing, 16(1), 69–73.
2. Wang, H. X., Zhou, L. N., Zhang, W., & Liu, S. (2013). Watermarking-based perceptual hashing search over encrypted speech. In Y. Q. Shi, H.-J. Kim, & F. Pérez-González (Eds.), IWDW. LNCS (vol. 8389, pp. 423–434). New Zealand: Springer.
3. Juels, A., & Kaliski Jr, B.S. (2007). Pors: Proofs of retrievability for large files. In Proceedings of the 14th ACM Conference on Computer and Communications Security (pp. 584–597), ACM.
4. Shacham, H., & Waters, B. (2008). Compact proofs of retrievability. In International Conference on the Theory and Application of Cryptology and Information Security (pp. 90–107), Springer.
5. Erway, C., Küpçü, A., Papamanthou, C., & Tamassia, R. (2009). Dynamic provable data possession. In Proceedings of the 16th ACM Conference on Computer and Communications Security (pp. 213–222), ACM.
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献