3.9 Article

Towards Dynamic Remote Data Auditing in Computational Clouds

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Security and privacy for storage and computation in cloud computing

Lifei Wei et al.

INFORMATION SCIENCES (2014)

Review Computer Science, Hardware & Architecture

A survey on vehicular cloud computing

Md Whaiduzzaman et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2014)

Article Computer Science, Hardware & Architecture

Privacy-Preserving Public Auditing for Secure Cloud Storage

Cong Wang et al.

IEEE TRANSACTIONS ON COMPUTERS (2013)

Article Computer Science, Theory & Methods

An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing

Kan Yang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)

Article Computer Science, Information Systems

Toward Secure and Dependable Storage Services in Cloud Computing

Cong Wang et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2012)

Article Computer Science, Information Systems

Remote Data Checking Using Provable Data Possession

Giuseppe Ateniese et al.

ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY (2011)

Article Computer Science, Theory & Methods

Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing

Qian Wang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2011)

Article Computer Science, Hardware & Architecture

A View of Cloud Computing

Michael Armbrust et al.

COMMUNICATIONS OF THE ACM (2010)

Article Computer Science, Hardware & Architecture

Toward Publicly Auditable Secure Cloud Data Storage Services

Cong Wang et al.

IEEE NETWORK (2010)

Article Computer Science, Artificial Intelligence

Efficient remote data possession checking in critical information infrastructures

Francesc Sebe et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2008)

Article Computer Science, Artificial Intelligence

Multimodal face and fingerprint biometrics authentication on space-limited tokens

Muhammad Khurram Khan et al.

NEUROCOMPUTING (2008)