共 17 条
[11]
Enabling public verifiabilityand data dynamics for storage security in cloud computing .2 WANG Q,WANG C,LI J,et al. European Symposium on Research in ComputerSecurity . 2009
[12]
Multi-authority attribute based encryption .2 M. Chase. TCC . 2007
[13]
Achieving efficient conjunctive keyword searches over encrypted data .2 Lucas Ballard,Seny Kamara,Fabian Monrose. Information and Communications Security . 2005
[14]
Fully Homomorphic Encryption overthe Integers withShorter Public Keys .2 J.S. Coron,A. Mandal,D. Naccache,M. Tibouchi. CRYPTO2011 . 2011
[15]
Ciphertext-policy attribute-based encryption .2 Bethencourt J,Sahai A,Waters B. IEEE Symposium on Security and Privacy(SP’’07) . 2007
[16]
Attribute-based access control with efficient revocation in data outsourcing systems .2 Hur,Junbeom,Noh,Dong Kun. IEEE Transactions on Parallel and Distributed Systems . 2011
[17]
Privacy-preserving public auditing for data storage security in cloud computing .2 C. Wang,Q. Wang,K. Ren et al. 29th IEEE INFOCOM . 2010