1. Privacy-preserving public auditing in cloud computing with data deduplication;Alkhojandi,2014
2. Provable data possession at untrusted stores;Ateniese,2007
3. Proxy re-signatures: new definitions, algorithms, and applications;Ateniese,2005
4. Message-locked encryption and secure deduplication;Bellare,2013
5. Introduction to modern cryptography;Bellare,2005