1. Research and Development of Provable Data Integrity in Cloud Storage;Tan;J. Comput.,2015
2. Big Data Stream Computing: Technologies and Instances;Sun;J. Softw.,2014
3. (2023, June 16). Storm Acker. Available online: https://www.cnblogs.com/DreamDrive/p/6671194.html.
4. Ateniese, G., Burns, R., and Curtmola, R. (November, January 31). Provable Data Possession at Untrusted Stores. Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA.
5. Ateniese, G., Di, P.R., Mancini, L.V., and Tsudik, G. (2008, January 22–25). Scalable and Efficient Provable Data Possession. Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, Istanbul, Turkey.