[1] 应作斌, 马建峰, 崔江涛. 支持位置验证和策略变更的属性加密方案[J]. 西安电子科技大学学报, 2017, 44(2): 57-62.
YING Zuobin, MA Jianfeng, CUI Jiangtao. Attribute-based Encryption with Location Verification and Policy Adjusting Supporting the Cloud Mobile Office[J]. Journal of Xidian University, 2017, 44(2): 57-62.
[2] 齐卫宁, 王劲林. 大数据时代的安全云存储平台[J]. 网络新媒体技术, 2016, 5(2): 1-7.
QI Weining, WANG Jinlin. Secure Cloud Storage Platform in Big Data Era[J]. Network New Media, 2016, 5(2): 1-7.
[3] ATENIESE G, BURNS R C, CURTMOLA R, et al. Probable Data Possession at Untrusted Stores[C]//Proceedings of 2007 ACM Conference on Computer and Communications Security. New York: ACM, 2007: 598-609.
[4] CURTMOLA R, KHAN O, BURNS R, et al. MR-PDP: Multiple-replica Provable Data Possession[C]//Proceedings of the 28th International Conference on Distributed Computing Systems. Piscataway: IEEE, 2008: 411-420.
[5] BARSOUM A F, ANWAR HASAN M. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(3): 485-497.
[6] 李超零, 陈越, 谭鹏许, 等. 基于同态hash的数据多副本持有性证明方案[J]. 计算机应用研究, 2013, 30(1): 265-269.
LI Chaoling, CHEN Yue, TAN Pengxu, et al. Multiple-replica Provable Data Possession Based on Homomorphic Hash[J]. Application Research of Computers, 2013, 30(1): 265-269. |