[1] Cui Yihui, Peng Zhiyong, Song Wei, et al. A time-based group key management algorithm based on proxy re-encryption for cloud storage[C]// Proceedings of the 16th Asia-Pacific Web Conference on Web Technologies and Applications. 2014:117-128.
[2] Wang Cong, Wang Qian, Ren Kui, et al. Privacy-preserving public auditing for data storage security in cloud computing[C]// Proceedings of the 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies. 2010:525-533.
[3] Ren Kui, Wang Cong, Wang Qian. Security challenges for the public cloud[J]. IEEE Internet Computing, 2012,16(1):69-73.
[4] Shah M A, Baker M, Mogul J C, et al. Auditing to keep online storage services honest[C]// Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems. 2007: Article No. 11.
[5] Shacham H, Waters B. Compact proofs of retrievability[C]// Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security. 2008:90-107.
[6] Wang Qian, Wang Cong, Li Jin, et al. Enabling public verifiability and data dynamics for storage security in cloud computing[C]// Proceedings of the 14th European Conference on Research in Computer Security. 2009:355-370.
[7] 黄润生,黄浩. 混沌及其应用[M]. 2版. 武汉:武汉大学出版社, 2005:23.
[8] Henon M, Pomeau Y. Two strange attractors with a simple structure[M]// Turbulence and Navier Stokes Equation. Springer, 1976:29-68.
[9] 李昌刚,韩正之,张浩然. 一种基于随机密钥及“类标准映射”的图像加密算法[J]. 计算机学报, 2003,26(4):465-470.
[10] 韩德志,杜周杰,毕坤. 云存储中数据持有性证明方法研究[J]. 计算机研究与发展, 2015,52(S2):35-42.
[11] 付伟,叶清,陈泽茂,等. 云存储中的数据持有性证明研究综述[J]. 通信学报, 2012,33(z2):201-206.
[12] 俞能海,郝卓,徐甲甲,等. 云安全研究进展综述[J]. 电子学报, 2013,41(2):371-381.
[13] 肜丽,栗磊,李超零. 一种可扩展的动态数据持有性证明方案[J]. 计算机应用研究, 2013,30(7):2132-2135.
[14] 王艳芬,林土胜. 一种混沌序列产生及加密方法[J]. 广西师范大学学报(自然科学版), 2005,23(1):76-79.
[15] 王工一. 混沌序列流密码[J]. 计算机与信息技术, 2002(3):1-6.
[16] 胡汉平,刘双红,王祖喜,等. 一种混沌密钥流产生方法[J]. 计算机学报, 2004,27(3):408-412.
[17] 林卫强,黄元石. Logistic混沌序列的随机性分析[J]. 福州大学学报(自然科学版), 2004,32(3):270-274. |