相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users
Anmin Fu et al.
IEEE TRANSACTIONS ON BIG DATA (2022)
Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data
Yue Zhang et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage
Wenting Shen et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)
Dynamic and Public Auditing with Fair Arbitration for Cloud Data
Hao Jin et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2018)
Remote data possession checking with privacy-preserving authenticators for cloud storage
Wenting Shen et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage
Yong Yu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds
Yujue Wang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Strong Key-Exposure Resilient Auditing for Secure Cloud Storage
Jia Yu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
被撤回的出版物: Dynamic remote data auditing for securing big data storage in cloud computing (Retracted article. See vol. 444, pg. 187, 2018)
Mehdi Sookhak et al.
INFORMATION SCIENCES (2017)
Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium
Wenting Shen et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)
RITS-MHT: Relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing
Neenu Garg et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)
Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud
Jiangtao Li et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
Jia Yu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
Huaqun Wang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability
Guangyang Yang et al.
JOURNAL OF SYSTEMS AND SOFTWARE (2016)
Enabling Cloud Storage Auditing With Key-Exposure Resistance
Jia Yu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
Ayad F. Barsoum et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
Boyang Wang et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2015)
OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
Jin Li et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2015)
Symmetric-Key Based Proofs of Retrievability Supporting Public Verification
Chaowen Guan et al.
COMPUTER SECURITY - ESORICS 2015, PT I (2015)
Secure and efficient privacy-preserving public auditing scheme for cloud storage
Solomon Guadie Worku et al.
COMPUTERS & ELECTRICAL ENGINEERING (2014)
Identity-based remote data possession checking in public clouds
Huaqun Wang et al.
IET INFORMATION SECURITY (2014)
Compact Proofs of Retrievability
Hovav Shacham et al.
JOURNAL OF CRYPTOLOGY (2013)
Security Challenges for the Public Cloud
Kui Ren et al.
IEEE INTERNET COMPUTING (2012)
Fuzzy identity based signature with applications to biometric authentication
Piyi Yang et al.
COMPUTERS & ELECTRICAL ENGINEERING (2011)
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
Yevgeniy Dodis et al.
SIAM JOURNAL ON COMPUTING (2008)
Short signatures from the Weil pairing
D Boneh et al.
JOURNAL OF CRYPTOLOGY (2004)
An introduction to biometric recognition
AK Jain et al.
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2004)