Author:
Benabbas Siavosh,Gennaro Rosario,Vahlis Yevgeniy
Publisher
Springer Berlin Heidelberg
Reference61 articles.
1. Ajtai, M.: The invasiveness of off-line memory checking. In: STOC, pp. 504–513 (2002)
2. Amazon Elastic Compute Cloud, http://aws.amazon.com/ec2
3. Lecture Notes in Computer Science;B. Applebaum,2010
4. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: ACM CCS, pp. 598–609 (2007)
5. Babai, L.: Trading group theory for randomness. In: Proceedings of the ACM Symposium on Theory of Computing (STOC), pp. 421–429. ACM, New York (1985)
Cited by
256 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献