Sign in

Identity-based provable data possession revisited: Security analysis and generic construction.

Hongyu LiuYi MuJining ZhaoChunxiang XuHuaqun WangLeiting ChenYong Yu
Published in: Comput. Stand. Interfaces (2017)
Keyphrases
  • security analysis
  • data sources
  • data structure
  • data points
  • data mining techniques