Login / Signup
Identity-based provable data possession revisited: Security analysis and generic construction.
Hongyu Liu
Yi Mu
Jining Zhao
Chunxiang Xu
Huaqun Wang
Leiting Chen
Yong Yu
Published in:
Comput. Stand. Interfaces (2017)
Keyphrases
</>
security analysis
data sources
data structure
data points
data mining techniques