[1] 姜哲. 无人机巡线电力设备故障的视觉检测技术 [D]. 西安: 电子科技大学, 2017. [2] 何道敬, 杜晓, 乔银荣, 等. 无人机信息安全研究综述 [J]. 计算机学报, 2019, 42(5): 1076-1094 [3] 冯朝胜, 秦志光, 袁丁. 云数据安全存储技术 [J]. 计算机学报, 2015, 38(1): 150-163 [4] 冯登国, 张敏, 张妍, 等. 云计算安全研究 [J]. 软件学报, 2011, 22(1): 71-83 [5] WAZID M, DAS A K, KUMAR N, et al. Secure three-factor user authentication scheme for renewable-energy-based smart grid environment [J]. IEEE Transactions on Industrial Informatics, 2017, 13(6): 3144-3153. [6] 谭霜, 贾焰, 韩伟红. 云存储中的数据完整性证明研究及进展 [J]. 计算机学报, 2015, 38(1): 164-177 [7] XU J, WEI L, ZhANG Y, et al. Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures [J]. Journal of Network and Computer Applications, 2018, 107: 113-124. [8] PENG S, ZHOU F, LI J, et al. Efficient, dynamic and identity-based remote data integrity checking for multiple replicas [J]. Journal of Network and Computer Applications, 2019, 134: 72-88. [9] SEBÉ F, DOMINGO-FERRER J, MARTINEZ-BALLESTE A, et al. Efficient remote data possession checking in critical information infrastructures [J]. IEEE Transactions on Knowledge and Data Engineering, 2008, 20(8): 1034-1038. [10] WANG Q, WANG C, REN K, et al. Enabling public auditability and data dynamics for storage security in cloud computing [J]. IEEE Transactions on Parallel and Distributed Systems, 2010, 22(5): 847-859. [11] 张庆功, 赵现昌. SIFT算法在无人机遥感影像特征提取中的应用 [J]. 河南水利与南水北调, 2019, 48(11): 63-65 [12] 郭会, 邓伦治. 一个基于双线性映射的无证书多接收者签密方案 [J]. 贵州师范大学学报(自然科学版), 2018, 36(6): 98-105 [13] 许钟华, 张龙军. 基于MHT的云环境下数据完整性检验方案 [J]. 计算机与网络, 2014, 40(19): 63-66 [14] 苏迪, 刘竹松. 一种新型的Merkle哈希树云数据完整性审计方案 [J]. 计算机工程与应用, 2018, 54(1): 70-76. [15] LI L M, YANG Y H, WU Z H. FMR-PDP: Flexible multiple replica provable data possession in cloud storage [C]//International Symposium on Computers and Communications. 2017: 1115-1121. [16] 李晨. 云存储数据的安全审计技术研究 [D]. 西安: 电子科技大学, 2018. [17] 秦志光, 王士雨, 赵洋, 等. 云存储服务的动态数据完整性审计方案[J]. 计算机研究与发展, 2015, 52(10): 2192-2199. [18] PAPAMANTHOU C, TAMASSIA R, TRIANDOPOULOS N. Optimal authenticated data structures with multilinear forms [C]//International Conference on Pairing Based Cryptography. Springer, 2010: 246-264. [19] HARIHARASITARAMAN S, BALAKANNAN S P. A dynamic data security mechanism based on position aware merkle tree for health rehabilitation services over cloud [J]. Journal of Ambient Intelligence and Humanized Computing, 2019(7): 1-15. [20] ERWAY C, PAPAMANTHOU A C, TAMASSIA R. Dynamic provable data possession [J]. ACM Transactions on Information and System Security, 2015, 7(4): 1-29.
|