Author:
Xue Liang,Ni Jianbing,Li Yannan,Shen Jian
Funder
NSFC
Fundamental Research Funds for the Central Universities
Subject
Law,Hardware and Architecture,Software
Reference27 articles.
1. VNI. Cisco, Cisco Visual Networking Index: Forecast and Methodology, 2013–2018: Visual Networking Index, 2014.
2. Deleting secret data with public verifiability;Feng;IEEE Trans. Dependable Secur. Comput.,2015
3. G. Ateniese, R.C. Burns, R. Curtmola, J. Herring, L. Kissner, Z.N.J. Peterson, D. Song, Provable data possession at untrusted stores, Proceeding of ACM CCS'07, Alexandria, Virginia, USA, (October–November 2007) pp. 598–609.
4. Short signatures from the Weil pairing;Dan;J. Cryptology,2004
5. Q. Wang, C. Wang, K. Ren, W. Lou, J. Li, Enabling public auditability and data dynamics for storage security in cloud computing, Proceeding of ESORICS'09, Saint Malo, France, (September 2009) pp. 355–370.
Cited by
43 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献