Login / Signup
Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage.
Debiao He
Huaqun Wang
Jianhong Zhang
Lina Wang
Published in:
Inf. Sci. (2017)
Keyphrases
</>
cloud computing
service providers
database
original data
data sources
xml documents
data quality
databases
data mining