1Dan Boneh,Ben Lynn,Hovav Shacham.Short Signatures from the Weil Pairing[J]. Journal of Cryptology . 2004 (4)
2Naor M,Rothblum G N.The complexity of online memory checking. Proc of FOCS’’’’’’’’05 . 2005
3Wang C,Wang Q,Ren K,et al.Ensuring data storage security in cloud computing. Proc of IWQoS’’’’’’’’09 . 2009
4Curtmola R,Khan O,Burns R.Robust remote data checking. Proc of StorageSS’’’’’’’’08 . 2008
5Shah M A,Baker M,Mogul J C,et al.Auditing to keep online storage services honest. Proc of HotOS’’’’’’’’07 . 2007
6Shah M A,Swaminathan R,Baker M.Privacy-preserving audit and extraction of digital contents. http://eprint.iacr.org/2008/186.pdf . 2008
7Heitzmann A,Palazzi B,Papamanthou,et al.Efficient integrity checking of untrusted network storage. Proc of StorageSS’’’’’’’’08 . 2008
8SebéF,Balleste A M,Deswarte Y,et al.Time-bounded remote file integrity checking. Laboratary for Analysis and Architecture of Systems Technical Report04429 . 2004
9Gray J.What Next/A Few Remaining Problems in Information Technology. http://research.microsoft.com/-gray/talks/Gray-Turning-FCRC.pdf . 1999