Related references
Note: Only part of the references are listed.Intelligent Offloading in Multi-Access Edge Computing: A State-of-the-Art Review and Framework
Bin Cao et al.
IEEE COMMUNICATIONS MAGAZINE (2019)
A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature
Hongliang Zhu et al.
IEEE ACCESS (2019)
Joint Optimization of Radio and Virtual Machine Resources With Uncertain User Demands in Mobile Cloud Computing
Yun Li et al.
IEEE TRANSACTIONS ON MULTIMEDIA (2018)
Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation
Yuan Zhang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources
Wei Song et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Tell me the truth: Practically public authentication for outsourced databases with multi-user modification
Wei Song et al.
INFORMATION SCIENCES (2017)
An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
Kan Yang et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)
Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage
Yan Zhu et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)
Efficient remote data possession checking in critical information infrastructures
Francesc Sebe et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2008)
Short signatures from the Weil pairing
D Boneh et al.
JOURNAL OF CRYPTOLOGY (2004)