共 50 条
- [1] Merkle Hash Tree based Deduplication in Cloud Storage [J]. MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 6223 - 6227
- [2] Homomorphic Authentication Based on Rank-Based Merkle Hash Tree [J]. ADVANCES IN INTERNET, DATA & WEB TECHNOLOGIES, 2018, 17 : 841 - 848
- [4] An Efficient RSU Authentication Scheme based on Merkle Hash Tree for VANETs [J]. ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
- [5] An efficient Minkowski distance-based matching with Merkle hash tree authentication for biometric recognition in cloud computing [J]. Soft Computing, 2019, 23 : 13423 - 13431
- [7] The Cloud Access Control Based on Dynamic Feedback and Merkle Hash Tree [J]. 2012 FIFTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2012), VOL 1, 2012, : 217 - 221
- [8] A New Broadcast Authentication Method Based on Merkle Tree [J]. ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION TECHNOLOGY 2010 (APYCCT 2010), 2010, : 787 - 791
- [9] Dynamic Provable Data Possession Based on Ranked Merkle Hash Tree [J]. 2016 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI), 2016, : 4 - 9
- [10] Research on E-commerce User Information Encryption Technology Based on Merkle Hash tree [J]. 2019 INTERNATIONAL CONFERENCE ON ROBOTS & INTELLIGENT SYSTEM (ICRIS 2019), 2019, : 365 - 369