1. Brunette G, Mogull R. Security guidance for critical areas of focus in cloud computing v2. 1. Cloud Security Alliance, 2009
2. Juels A, Kaliski B S. PORs: proofs of retrievability for large files. Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS’07), Oct 29?Nov 2, 2007, Alexandria, VA, USA. New York, NY, USA: ACM, 2007: 584?597
3. Bowers K D, Juels A, Oprea A. Proofs of retrievability: theory and implementation. Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW’09), Nov 9?13, 2009, Chicago, IL, USA. New York, NY, USA: ACM, 2009: 43?54
4. Zheng Q J, Xu S H. Fair and dynamic proofs of retrievability. Proceedings of the 1st ACM Conference on Data and Application Security and Privacy (CODASPY’11), Feb 21?23, 2011, San Antonio, TX, USA. New York, NY, USA: ACM, 2011: 237?248
5. Cash D, Küp?ü A, Wichs D. Dynamic proofs of retrievability via oblivious ram. Advances in Cryptology: Proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT’13), May 26?30, 2013, Athens, Greece. LNCS 7881. Berlin, Germany: Springer-Verlag, 2013: 279?295
6. Shacham H, Waters B. Compact proofs of retrievability. Advances in Cryptology: Proceedings of the 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT’08), Apr 13?17, 2008, Istanbul, Turkey. LNCS 4965. Berlin, Germany: Springer-Verlag, 2008: 90?107
7. Bowers K D, Juels A, Oprea A. HAIL: a high-availability and integrity layer for cloud storage. Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS’09), Nov 9?13, 2009, Chicago, IL, USA. New York, NY, USA: ACM, 2009:187?198
8. Xu J, Chang E C. Towards efficient proofs of retrievability. Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (ASIACCS’12), May 2?4, 2012, Seoul, Republic of Korea. New York, NY, USA: ACM, 2012: 79?80
9. Ateniese G, Burns R, Curtmola R, et al. Remote data checking using provable data possession. ACM Transactions on Information and System Security, 2011, 14(1): Article 12.
10. Curtmola R, Khan O, Randal B, et al. MR-PDP: multiple-replica provable data possession. Proceedings of the 28th International Conference on Distributed Computing Systems (ICDCS’08), Jun 17?20, 2008, Beijing, China. Piscataway, NJ, USA: IEEE, 2008:411?420
|