Funder
China Postdoctoral Science Foundation
National Key Research and Development Program of China
National Natural Science Foundation of China
Ministry of Education of the People's Republic of China
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference51 articles.
1. Remote data auditing in cloud computing environments: a survey, taxonomy, and open issues;Sookhak;ACM Comput. Surv.,2015
2. Cloud computing vulnerability incidents: a statistical overview;Alliance,2013
3. Consistency as a service: Auditing cloud consistency;Liu;IEEE Trans. Netw. Serv. Manag.,2014
4. Ralph C. Merkle, Protocols for public key cryptosystems, in: IEEE Symposium on Security and Privacy, Oakland, CA, USA, 1980, pp. 122–122.
5. Jason Reid, JuanM. Gonzalez Nieto, Tee Tang, Bouchra Senadji, Detecting relay attacks with timing-based protocols, in: ACM Symposium on Information, Computer and Communications Security, Singapore, 2007, pp. 204–213.
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献