Author:
Xu Jian,Wei Laiwen,Zhang Yu,Wang Andi,Zhou Fucai,Gao Chong-zhi
Funder
National Natural Science Foundation of China
Higher Education in Liaoning province
Doctoral Science Fund of Liaoning province
Natural Science Foundation of Guangdong Province
Guangzhou scholars project for universities of Guangzhou
Science and Technology Planning Project of Guangdong Province
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference30 articles.
1. New models for efficient authenticated dictionaries;Atighehchi;Comput. Secur.,2015
2. Verifiable delegation of computation over large datasets;Benabbas,2011
3. Don't trust the cloud, verify: integrity and consistency for cloud object stores;Brandenburger;ACM Trans. Priv. Secur.,2017
4. Chameleon-hashes with ephemeral trapdoors and applications to invisible sanitizable signatures;Camenisch,2017
5. Vector commitments and their applications;Catalano,2013
Cited by
143 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献