Funder
Australian Research Council DP grant
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference32 articles.
1. Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In Advances in cryptology-ASIACRYPT 2003 (pp. 452–473). Springer.
2. Ateniese, G., Burns, R. C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z. N. J., & Song, D. X. (2007). Provable data possession at untrusted stores. In ACM conference on computer and communications security-CCS 2007 (pp. 598–609). ACM.
3. Ateniese, G., Kamara, S., & Katz, J. (2009). Proofs of storage from homomorphic identification protocols. In Advances in cryptology-ASIACRYPT 2009 (pp. 319–333). Springer.
4. Bao, F., Deng, R. H., & Zhu, H. (2003). Variations of Diffie–Hellman problem. In International conference on information and communications security-ICICS 2003 (pp. 301–312). Springer.
5. Feng, Y., Mu, Y., Yang, G., & Liu, J. K. (2015). A new public remote integrity checking scheme with user privacy. In: Australasian conference on information security and privacy-ACISP 2015 (pp. 377–394). Springer.
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献