Author:
Zhang Jindan,Li Zhihu,Wang Baocang,Wang Xu An,Ogiela Urszula
Funder
National Natural Science Foundation of China
Subject
Library and Information Sciences,Management Science and Operations Research,Computer Science Applications,Media Technology,Information Systems
Reference34 articles.
1. Certificateless public key cryptography;Al-Riyami;Aisacrypt,2003
2. Provable data possession at untrusted stores;Ateniese;CCS,2007
3. Dynamic proofs of retrievability via oblivious RAM;Cash;Eurocrypt,2013
4. Proofs of ownership in remote storage systems;Halevi;CCS,2011
5. Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage;He;Inf. Sci.,2017
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献