[1]陈康, 郑纬民. 云计算:系统实例与研究现状[J]. 软件学报, 2009, 20(5): 13371348[2]陈恺. 2016年RSA大会信息安全热点[J]. 信息技术与标准化, 2016 (3): 1516[3]吴吉义, 沈千里, 章剑林, 等. 云计算: 从云安全到可信云[J]. 计算机研究与发展, 2011, 48(S1): 229233[4]冯朝胜, 秦志光, 袁丁. 云数据安全存储技术[J]. 计算机学报, 2015, 38(1): 150163[5]Heron S. Advanced encryption standard (AES)[J]. Network Security, 2009, 2009(12): 812[6]Wang S, Liu G. File encryption and decryption system based on RSA algorithm[C] Proc of 2011 Int Conf on Computational and Information Sciences (ICCIS). Piscataway, NJ: IEEE, 2011: 797800[7]Ateniese G, Fu K, Green M, et al. Improved proxy reencryption schemes with applications to secure distributed storage [J]. ACM Trans on Information and System Security, 2006, 9(1): 130[8]Kalpana P, Singaraju S. Data security in cloud computing using RSA algorithm [J]. IJRCCT, 2012, 1(4): 143146[9]Ateniese G, Burns R, Curtmola R, et al. Provable data possession at untrusted stores[C]Proc of the 14th ACM Conf on Computer and Communications Security. New York: ACM, 2007: 598609[10]Juels A, Jr Kaliski B S. PORs: Proofs of retrievability for large files[C] Proc of the 14th ACM Conf on Computer and Communications Security. New York: ACM, 2007: 584597[11]Zhu Y, Wang H, Hu Z, et al. Efficient provable data possession for hybrid clouds[C] Proc of the 17th ACM Conf on Computer and Communications Security. New York: ACM, 2010: 756758[12]Mahajan P, Sachdeva A. A study of encryption algorithms AES, DES and RSA for security [J]. Global Journal of Computer Science and Technology, 2013, 13(15): 1522[13]王茜, 倪建伟. 一种基于RSA的加密算法[J]. 重庆大学学报: 自然科学版, 2005, 28(1): 6872[14]张裔智, 赵毅, 汤小斌. MD5算法研究[J]. 计算机科学, 2008, 35(7): 295297
|