共 50 条
- [3] Data Hiding and Integrity Verification based on Quotient Value Differencing and Merkle Tree [J]. Arabian Journal for Science and Engineering, 2023, 48 : 1793 - 1805
- [5] Merkle Hash Tree based Deduplication in Cloud Storage [J]. MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 6223 - 6227
- [6] A variable block size integrity verification method based on Hash tree [J]. Gaojishu Tongxin/Chinese High Technology Letters, 2011, 21 (11): : 1149 - 1156
- [7] Blockchain Based Data Integrity Verification for Cloud Storage with T-Merkle Tree [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2020, PT III, 2020, 12454 : 65 - 80
- [8] Optimal parameter selection for efficient memory integrity verification using Merkle hash trees [J]. THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, : 383 - 388
- [10] Homomorphic Authentication Based on Rank-Based Merkle Hash Tree [J]. ADVANCES IN INTERNET, DATA & WEB TECHNOLOGIES, 2018, 17 : 841 - 848