共 15 条
[1]
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[2]
Erway CC, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P213
[5]
Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584
[7]
Analysis of Delegable and proxy Provable Data Possession for Cloud Storage
[J].
2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014),
2014,
:779-782
[9]
An Efficient Verifiably Encrypted Signature from Weil Pairing
[J].
JOURNAL OF INTERNET TECHNOLOGY,
2013, 14 (06)
:947-952
[10]
Shen ST, 2011, LECT NOTES COMPUT SC, V7043, P93, DOI 10.1007/978-3-642-25243-3_8