4.7 Article

OUTSOURCED DATA INTEGRITY CHECKING WITH PRACTICAL KEY UPDATE IN EDGE-CLOUD RESILIENT NETWORKS

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage

Yong Yu et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2020)

Article Engineering, Electrical & Electronic

IntegrityChain: Provable Data Possession for Decentralized Storage

Yannan Li et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2020)

Article Computer Science, Hardware & Architecture

Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems

Yannan Li et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Computer Science, Information Systems

Identity-based key-exposure resilient cloud storage public auditing scheme from lattices

Xiaojun Zhang et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Theory & Methods

Privacy preserving cloud data auditing with efficient key update

Yannan Li et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Hardware & Architecture

BLOCKCHAIN-BASED SOLUTIONS TO SECURITY AND PRIVACY ISSUES IN THE INTERNET OF THINGS

Yong Yu et al.

IEEE WIRELESS COMMUNICATIONS (2018)

Article Computer Science, Theory & Methods

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage

Yong Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Multidisciplinary Sciences

Provenance based data integrity checking and verification in cloud environments

Muhammad Imran et al.

PLOS ONE (2017)