원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.8 No.5
2014.09
pp.97-108
피인용수 : 0건 (자료제공 : 네이버학술정보)
목차
Abstract
1. Introduction
2. Related Work
3. Provable Data Possession Schemes by EC (Elliptic Curve)
3.1 Preliminaries
3.2 EC-PDP
3.3 EC-PDP with Weaker Guarantee
4. System Implementation and Performance Evaluation
4.1 Implementation
4.2 Security
4.3 Computation Complexity
4.4 Communication Complexity
4.5 Block Access Complexity
5. Conclusion
Acknowledgements
References
1. Introduction
2. Related Work
3. Provable Data Possession Schemes by EC (Elliptic Curve)
3.1 Preliminaries
3.2 EC-PDP
3.3 EC-PDP with Weaker Guarantee
4. System Implementation and Performance Evaluation
4.1 Implementation
4.2 Security
4.3 Computation Complexity
4.4 Communication Complexity
4.5 Block Access Complexity
5. Conclusion
Acknowledgements
References
저자정보
참고문헌
자료제공 : 네이버학술정보