References
- Fei Chen, Tao Xiang, Yuanyuan Yang, and Chow S.S.M., "Secure cloud storage meets with secure network coding," in INFOCOM, 2014 Proceedings IEEE, vol., no., pp.673-681, April 27 2014-May 2 2014
- Cong Wang, Chow, S.S.M., Qian Wang, Kui Ren, and Wenjing Lou, "Privacy-Preserving Public Auditing for Secure Cloud Storage," in Computers, IEEE Transactions on , vol.62, no.2, pp.362-375, Feb. 2013 https://doi.org/10.1109/TC.2011.245
- Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, and Dawn Song. "Provable data possession at untrusted stores," in Proceedings of the 14th ACM conference on Computer and communications security (CCS '07). ACM, New York, NY, USA, 598-609.
- https://spideroak.com/
- https://www.boxcryptor.com/
- D. Boneh, and M. Franklin, "Identity-based encryption from the weil pairing," SIAM J. Comput., 32(3):586-615, Mar 2003. https://doi.org/10.1137/S0097539701398521
- X. Lin, X. Sun, P. Ho, and X. Shen. "GSIS: A secure and privacy-preserving protocol for vehicular communications," Vehicular Technology, IEEE Transactions on, 56(6):3442-3456, Nov. 2007. https://doi.org/10.1109/TVT.2007.906878
- Young-Hoon Park, and Seung-Woo Seo, "Scheme for Verification Between Mobile Devices in a Service with Expiration Time by Using Zeroknowledge Proof", in Journal of the Institute of Electronics Engineers of Korea Vol. 50 No.3, pp. 23-32, Mar. 2013
- Y. Kawahara, T. Takagi, and E. Okamoto. "Efficient Implementation of Tate Pairing on a Mobile Phone Using Java," In Computational Intelligence and Security, Lecture Notes In Artificial Intelligence, Vol. 4456. Springer-Verlag, Berlin, Heidelberg 396-405.
- S. D. Galbraith, K. Harrison, and D. Soldera. 2002. "Implementing the Tate Pairing," In Proceedings of the 5th International Symposium on Algorithmic Number Theory (ANTS-V), Claus Fieker and David R. Kohel (Eds.). Springer-Verlag, London, UK, UK, 324-337.
- WooKwon Koo, JungYeon Hwang, Hyoung-Joong Kim, and DongHoon Lee, "ID-Based Proxy Reencryption Scheme with Chosen-CiphertextSecurity", in Journal of the Institute of Electronics Engineers of Korea Vol. 46 No. 3, pp. 64-77, Jan. 2009
- Anca-Andreea Ivan and Yevgeniy Dodis. Proxy Cryptography Revisited. In NDSS. The Internet Society, 2003.
- Ran Canetti and Susan Hohenberger. 2007. Chosen-ciphertext secure proxy re-encryption. In Proceedings of the 14th ACM conference on Computer and communications security (CCS '07). ACM, New York, NY, USA, 185-194.