4.7 Article

Public integrity verification for data sharing in cloud with asynchronous revocation

Related references

Note: Only part of the references are listed.
Review Engineering, Electrical & Electronic

Intelligent Offloading in Multi-Access Edge Computing: A State-of-the-Art Review and Framework

Bin Cao et al.

IEEE COMMUNICATIONS MAGAZINE (2019)

Article Computer Science, Information Systems

A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature

Hongliang Zhu et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Joint Optimization of Radio and Virtual Machine Resources With Uncertain User Demands in Mobile Cloud Computing

Yun Li et al.

IEEE TRANSACTIONS ON MULTIMEDIA (2018)

Article Computer Science, Theory & Methods

Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation

Yuan Zhang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Theory & Methods

Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources

Wei Song et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Information Systems

Tell me the truth: Practically public authentication for outsourced databases with multi-user modification

Wei Song et al.

INFORMATION SCIENCES (2017)

Article Computer Science, Theory & Methods

An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing

Kan Yang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)

Article Computer Science, Theory & Methods

Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage

Yan Zhu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)

Article Computer Science, Artificial Intelligence

Efficient remote data possession checking in critical information infrastructures

Francesc Sebe et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2008)

Article Computer Science, Theory & Methods

Short signatures from the Weil pairing

D Boneh et al.

JOURNAL OF CRYPTOLOGY (2004)