Author:
Huang Shuai,Xiao Jing,Mao Hong-liang,Su Mu-ran,Ying Hai-bo,Tan Shuang
Reference20 articles.
1. Shuang, T., Yan, J., Wei-hong, H.: Research and progress of data integrity proof in cloud storage. Chin. J. Comput. 38(01), 164–177 (2015)
2. IFIP International Federation for Information Processing;Y Deswarte,2004
3. Lecture Notes in Computer Science;Q Wang,2009
4. Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 Proceedings IEEE Infocom, pp. 1–9. IEEE (2010)
5. Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598–609 (2007)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献