1 |
N. Cao, S. Yu, Z. Yang, W. Lou, and Y. T. Hou, "LT codes-based secure and reliable cloud storage service," in Proc. IEEE INFOCOM 2012, pp. 693-701, Orlando, U.S.A., Mar. 2012.
|
2 |
A. Juels and A. Oprea, "New approaches to security and availability for cloud data," Commun. ACM, vol. 56, no. 2, pp. 64-73, Feb. 2013.
|
3 |
I. Y. Jung, I. Jo, and Y. Yu, "Trust assurance of data in cloud computing environment," J. KICS, vol. 36, no. 9, pp. 1066-1072, Sep. 2011.
과학기술학회마을
DOI
ScienceOn
|
4 |
B. Wang, B. Li, and H. Li, "Public auditing for shared data with efficient user revocation in the cloud," in Proc. IEEE INFOCOM 2013, pp. 2904-2912, Turin, Italy, Apr. 2013.
|
5 |
B. Wang, H. Li, and M. Li, "Privacy-preserving public auditing for shared cloud data supporting group dynamics," in Proc. IEEE ICC 2013, pp. 539-543, Budapest, Hungary, June 2013.
|
6 |
M. Bellare and G. Neven, "Identity-based multi-signatures from RSA," in Proc. Cryptographers' Track at the RSA Conf. (CT-RSA 2007), pp. 145-162, San Francisco, U.S.A., Feb. 2007.
|
7 |
Pairing Based Cryptography (PBC) library, retrieved June 14, 2013, from http://crypto.stanford.edu/pbc/.
|
8 |
H. Shacham and B. Waters, "Compact proofs of retrievability," in Proc. ASIACRYPT 2008, pp. 90-107, Melbourne, Australia, Dec. 2008.
|