Author:
Singh Shubham,Thokchom Surmila
Reference39 articles.
1. 1-out-of-n signatures from a variety of keys, in: International Conference on the Theory and Application of Cryptology and Information Security;Abe,2002
2. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D., 2007. Provable data possession at untrusted stores, in: Proceedings of the 14th ACM conference on Computer and communications security, Acm. pp. 598–609.
3. A practical and provably secure coalition-resistant group signature scheme, in: Annual International Cryptology Conference;Ateniese,2000
4. B. Wang, L.B., Hui, L., 2013. Public auditing for shared data with efficient user revocation in the cloud, in: IEEE INFOCOM 2013, Turin, Italy, IEEE. pp. 2904–2912.
5. Backes, M., Fiore, D., Reischuk, R.M., 2013. Verifiable delegation of computation on outsourced data, in: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, ACM. pp. 863–874.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献