相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Blockchain-Enabled Secure Data Sharing Scheme in Mobile-Edge Computing: An Asynchronous Advantage Actor-Critic Learning Approach
Lei Liu et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Blockchain-based public auditing for big data in cloud storage
Jiaxing Li et al.
INFORMATION PROCESSING & MANAGEMENT (2020)
Securing parked vehicle assisted fog computing with blockchain and optimal smart contract design
Xumin Huang et al.
IEEE-CAA JOURNAL OF AUTOMATICA SINICA (2020)
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage
Yong Yu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability
Xueping Liang et al.
2017 17TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID) (2017)
IPad: ID-based public auditing for the outsourced data in the standard model
Jianhong Zhang et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2016)
Provable multiple replication data possession with full dynamics for secure cloud storage
Yafang Zhang et al.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2016)
Cloud data integrity checking with an identity-based auditing mechanism from RSA
Yong Yu et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
Huaqun Wang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
Efficient ID-based public auditing for the outsourced data in cloud storage
Jianhong Zhang et al.
INFORMATION SCIENCES (2016)
Efficient Dynamic Provable Possession of Remote Data via Update Trees
Yihua Zhang et al.
ACM TRANSACTIONS ON STORAGE (2016)
Dynamic Provable Data Possession
C. Chris Erway et al.
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY (2015)
MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud
Chang Liu et al.
IEEE TRANSACTIONS ON COMPUTERS (2015)
Verifiable Auditing for Outsourced Database in Cloud Computing
Jianfeng Wang et al.
IEEE TRANSACTIONS ON COMPUTERS (2015)
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
Ayad F. Barsoum et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
An Effective Integrity Check Scheme for Secure Erasure Code-Based Storage Systems
Shiuan-Tzuo Shen et al.
IEEE TRANSACTIONS ON RELIABILITY (2015)
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Huaqun Wang
IEEE TRANSACTIONS ON SERVICES COMPUTING (2015)
Provably Secure Identity Based Provable Data Possession
Yong Yu et al.
PROVABLE SECURITY, PROVSEC 2015 (2015)
Identity-based remote data possession checking in public clouds
Huaqun Wang et al.
IET INFORMATION SECURITY (2014)
Cloud data auditing with designated verifier
Solomon Guadie Worku et al.
FRONTIERS OF COMPUTER SCIENCE (2014)
Privacy-Preserving Public Auditing for Secure Cloud Storage
Cong Wang et al.
IEEE TRANSACTIONS ON COMPUTERS (2013)
An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
Kan Yang et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)
Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing
Jining Zhao et al.
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES (2013)
Compact Proofs of Retrievability
Hovav Shacham et al.
JOURNAL OF CRYPTOLOGY (2013)
Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage
Yan Zhu et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)