共 9 条
[1]
"Compact Proofs of Retrievability,". H.Shacham,B.Waters. Proc of Asiacrypt’08 . 2008
[2]
"PORs:Proofs of Retrievability for Large Files,". A.Juels,J.Burton,S.Kaliski. Proc.of CCS’07 . 2007
[3]
“HAIL:A High-Availability and Integrity Layer for Cloud Storage,”. K.D.Bowers,A.Juels,A.Oprea. Cryptology ePrint Archive,Report2008/489 . 2008
[4]
Provable Data Possession at Untrusted Stores. G.Ateniese,R.Burns,R.Curtmola,J.Herring,L.Kissner,Z.Peterson,D.Song. Computer and Communications Security(CCS) . 2007
[5]
Provable Data Possession at Untrusted Stores. G.Ateniese,R.Burns,R.Curtmola,J.Herring,L.Kissner,Z.Peterson,D.Song. Computer and Communications Security(CCS) . 2007
[6]
Security Guidance for Critical Areas of Focus in Cloud Computing. Cloud Security Alliance. http://www.cloudsecurityalliance.org/csaguide.pdf . 2009
[7]
"Store,Forget,and Check:Using Algebraic Signatures to Check Remotely Administered Storage,". T.S.J.Schwarz,E.L.Miller. Proc.of ICDCS’06 . 2006
[8]
"Scalable and Efficient Provable Data Possession,". G.Ateniese,R.D.Pietro,L.V.Mancini,G.Tsudik. Proc.of SecureComm’08 . 2008
[9]
“Proofs of Retrievability:Theory and Implementation,”. K.D.Bowers,A.Juels,A.Oprea. Cryptology ePrint Archive,Report2008/175 . 2008