Open Access
Issue |
JNWPU
Volume 40, Number 5, October 2022
|
|
---|---|---|
Page(s) | 1188 - 1194 | |
DOI | https://doi.org/10.1051/jnwpu/20224051188 | |
Published online | 28 November 2022 |
- LI Xin, LAI Ji, CHEN Zhongtao, et al. Intelligent fault detection system for state grid IoT equipment based on edge computing[C]//2019 IEEE 3rd International Electrical and Energy Conference, 2019: 1434–1439 [Google Scholar]
- ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security, 2007: 598–609 [Google Scholar]
- ARMKNECHT F, BOHLI J M, KARAME G O, et al. Outsourced proofs of retrievability[C]//Proceedings of the 21st ACM Conference on Computer and Communications Security, 2014: 831–843 [Google Scholar]
- SHACHAM H, WATERS B. Compact proofs of retrievability[C]//Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, 2008 [Google Scholar]
- DODIS Y, VADHAN S, WICHS D. Proofs of retrievability via hardness amplification[C]//Proceedings of the 6th Theory of Cryptography Conference, 2009 [Google Scholar]
- BOWERS K D, JUELS A, OPREA A. HAIL: A high-availability and integrity layer for cloud storage[C]//Proceedings of 14th ACM Conference on Computer and Communications Security, 2009: 187–198 [Google Scholar]
- WANG C, WANG Q, REN K, et al. Privacy-preserving public auditing for data storage security in cloud computing[C]//IEEE International Conference on Computer Communications, 2010: 1–9 [Google Scholar]
- ATENIESE G, BURNS R, CURTMOLA R, et al. Remote data checking using provable data possession[J]. ACM Transactions on Information and System Security, 2011, 14(1): 1–34 [CrossRef] [Google Scholar]
- XU J, CHANG E C. Towards efficient proofs of retrievability[C]//Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, 2012: 79–80 [Google Scholar]
- CHEN J, PENG Y, DU R, et al. Regeneratingcodes-based efficient remote data checking and repairing in cloud storage[C]//Proceedings of 2015 IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2015: 143–150 [Google Scholar]
- SHI E, STEFANOV E, PAPAMANTHOU C. Practical dynamic proofs of retrievability[C]//Proceedings of 20th ACM Conference on Computer and Communications Security, 2013: 325–336 [Google Scholar]
- REN Z, WANG L, WANG Q, et al. Dynamic proofs of retrievability for coded cloud storage systems[J]. IEEE Trans on Serv Comput, 2018, 11(4): 685–698. [Article] [CrossRef] [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.