1. Jianying Zhou, Shaohua Tang, Li Xu, Yang Xiang, Xinyi Huang, Joseph K. Liu, Kaitai Liang, “Cost-Effective Authentic and Anonymous data sharing with forward security”, IEEE Transactions on computers, volume 64, 2015.
2. Anna C. Squicciarini, Dan Lin, and Smitha Sundareswaran, “Ensuring Distributed Accountability for Data Sharing in the Cloud,” IEEE Transaction on a secure computing, volume 9, 2012.
3. S. Huang, A. Squicciarini, D. Lin, and S. Sundareswaran, “Promoting Distributed Accountability in the Cloud,” IEEE Transaction on Cloud Computing, 2011.
4. Jun’e Liu, Robert H. Deng and ZhiguoWan, “HASBE: A Hierarchical Attribute-Based Solution for flexible and Scalable Access Control in Cloud Computing.
5. P.-L. Cayrel, P. Gaborit, C. A. Melchor, and F. Laguillaumie. A new efficient threshold ring signature scheme based on coding theory. IEEE Transactions on Information Theory, 57(7):4833–4842, 2011.