원문정보
보안공학연구지원센터(IJHIT)
International Journal of Hybrid Information Technology
Vol.6 No.6
2013.11
pp.301-310
피인용수 : 0건 (자료제공 : 네이버학술정보)
목차
Abstract
1. Introduction
2. Related work
3. Preliminaries
3.1. System Model
3.2. Design Goals
3.3. Complexity Assumptions
3.4. Proxy Re-signatures
4. Our Server Re-tag Provable Data Possession Scheme
4.1. Our Construction
4.2. Security Analysis
4.3. Batch Auditing for Data in Multi-client and cloud server
4.4. Performance Evaluation
5. Conclusions
Acknowledgements
References
1. Introduction
2. Related work
3. Preliminaries
3.1. System Model
3.2. Design Goals
3.3. Complexity Assumptions
3.4. Proxy Re-signatures
4. Our Server Re-tag Provable Data Possession Scheme
4.1. Our Construction
4.2. Security Analysis
4.3. Batch Auditing for Data in Multi-client and cloud server
4.4. Performance Evaluation
5. Conclusions
Acknowledgements
References
저자정보
참고문헌
자료제공 : 네이버학술정보
