1. Secure provenance: the essential of bread and butter of data forensics in cloud computing;Lu,2010
2. Dynamic secure cloud storage with provenance;Chow,2012
3. Digital provenance: Enabling secure data forensics in cloud computing;Li;Future Gener. Comput. Syst.,2014
4. Converting pairing-based cryptosystems from composite-order groups to prime-order groups;Freeman,2010
5. Fuzzy identity-based encryption;Sahai,2005