Cloud-Based Storage Model with Strong User Privacy Assurance
暂无分享,去创建一个
[1] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[2] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[3] Paul F. Syverson,et al. Onion routing , 1999, CACM.
[4] Jan Camenisch,et al. Compact E-Cash , 2005, EUROCRYPT.
[5] Paul F. Syverson. Onion routing for resistance to traffic analysis , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[6] Lee Rainie,et al. The future of cloud computing , 2010 .
[7] Kris Popat,et al. Human Interactive Proofs and Document Image Analysis , 2002, Document Analysis Systems.
[8] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[9] Christopher Soghoian,et al. Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era , 2009, J. Telecommun. High Technol. Law.