[1] Qiao Jianyong. Julia sets and complex singularities of free energies[J]. Memoirs of American Mathematical Society, 2015(234):1-89.
[2] Qiao Jianyong. On the preimages of parabolic points[J]. Nonlinearity, 2000(13):813-818.
[3] 高志鹏, 牛琨, 刘杰. 面向大数据的分析技术[J]. 北京邮电大学学报, 2015, 38(3):1-12. Gao Zhipeng, Niu Kun, Liu Jie. Analytics towards big data[J]. Journal of Beijing University of Posts and Telecommunications, 2015, 38(3):1-12.
[4] Chen Hefeng, Lin Bogang, Yang Yang, et al. Public batch auditing for 2M-PDP based on BLS in cloud storage[J]. Journal of Cryptologic Research, 2014, 1(4):368-378.
[5] Ateniese G, Burns R, Curtmola R. Provable data possession at untrusted stores[C]//Proc of CCS'07. New York:ACM, 2007:598-609.
[6] Curtmola R, Khan O, Burns R, et al. MR-PDP:multiple-replica provable data possession[C]//The 28th International Conference on Distributed Computing Systems. IEEE Computer Society, 2008:411-420.
[7] 查雅行, 罗守山, 卞建超, 等. 基于多分支认证树的多用户多副本数据持有性证明方案[J]. 通信学报, 2015, 36(11):80-91. Zha Yaxing, Luo Shoushan, Bian Jianchao, et al. Multiuser and multiple-replica provable data possession scheme based on multi-branch authentication tree[J]. Journal on Communications, 2015, 36(11):80-91.
[8] Wang Boyang, Li Baochun, Li Hui. Oruta:privacy-preserving public auditing for shared data in the cloud[C]//Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing.[S.l.]:IEEE Computer Society, 2012:295-302.
[9] Wang Boyang, Li Baochun, Li Hui. Knox:privacy-preserving auditing for shared data with large groups in the cloud[C]//International Conference on Applied Cryptography and Network Security.[S.l.]:Springer-Verlag, 2012:507-525.
[10] Wang Boyang, Li Baochun, Li Hui. Panda:public auditing for shared data with efficient user revocation in the cloud[J]. IEEE Transactions on Services Computing, 2015, 8(1):92-106.
[11] Yu Yong, Ni Jianbing, Au Manho, et al. On the security of a public auditing mechanism for shared cloud data service[J]. IEEE Transactions on Services Computing, 2014, 8(6):1-2.
[12] Yuan Jiawei, Yu Shucheng. Efficient public integrity checking for cloud data sharing with multi-user modification[C]//2014 Proceedings IEEE INFOCOM.[S.l.]:IEEE, 2014:2121-2129.
[13] Jiang Tao, Chen Xiaofeng, Ma Jianfeng. Public integrity auditing for shared dynamic cloud data with group user revocation[J]. IEEE Transactions on Computers, 2016, 65(8):2363-2373.
[14] 付安民, 秦宁元, 宋建业, 等. 云端多管理者群组共享数据中具有隐私保护的公开审计方案[J]. 计算机研究与发展, 2015, 52(10):2353-2362. Fu Anmin, Qin Ningyuan, Song Jianye, et al. Privacy-preserving public auditing for multiple managers shared data in the cloud[J]. Journal of Computer Research and Development, 2015, 52(10):2353-2362.
[15] 李晖, 孙文海, 李凤华, 等. 公共云存储服务数据安全及隐私保护技术综述[J]. 计算机研究与发展, 2014, 51(7):1397-1409. Li Hui, Sun Wenhai, Li Fenghua, et al. Secure and privacy-preserving data storage service in public cloud[J]. Journal of Computer Research and Development, 2014, 51(7):1397-1409.
[16] 黄龙霞, 张功萱, 付安民. 基于层次树的动态群组隐私保护公开审计方案[J]. 计算机研究与发展, 2016, 53(10):2334-2342. Huang Longxia, Zhang Gongxuan, Fu Anmin. Privacy-preserving public auditing for dynamic group based on hierarchical tree[J]. Journal of Computer Research and Development, 2016, 53(10):2334-2342.
[17] Li Jin, Kim Kwangjo. Hidden attribute-based signatures without anonymity revocation[J]. Information Sciences, 2010, 180(9):1681-1689.
[18] 陈桢, 张文芳, 王小敏. 基于属性的抗合谋攻击可变门限环签名方案[J]. 通信学报, 2015, 36(12):212-222. Chen Zhen, Zhang Wenfang, Wang Xiaomin. Attribute-based alterable threshold ring signature scheme with conspiracy attack immunity[J]. Journal on Communications, 2015, 36(12):212-222. |