Author:
Shen Mengyu,Liu Meiliang,Li Yang,Batbayar Delgerbat,Yao Xuanxia
Reference30 articles.
1. Rafaeli, S., Hutchison, D.: A survey of key management for secure group communication. ACM Comput. Surv. 35(3), 309–329 (2003)
2. Li, H., Sun, W.H., Li, F.H., Wang, B.: Secure and privacy-preserving data storage service in public cloud. J. Comput. Res. Dev. 51(1), 1397–1409 (2014)
3. Xue, M., Xue, W., Shu, J.W., et al.: A secure storage system over cloud storage environment. Chin. J. Comput. 38(5), 987–998 (2015)
4. Ateniese, G., Burns, R., Curtmola, R., et al.: Provable data possession at untrusted stores. In: ACM Conference on Computer and Communications Security, pp. 598–609. ACM (2007)
5. Juels, A., Kaliski, B.S.: PORs: proofs of retrievability for large files. In: ACM Conference on Computer and Communications Security, pp. 584–597. ACM (2007)