Sign in

A hill cipher-based remote data possession checking in cloud storage.

Lanxiang ChenGongde GuoZhen Peng
Published in: Secur. Commun. Networks (2014)
Keyphrases
  • data analysis
  • original data
  • data sets
  • high dimensional data
  • database
  • computer systems
  • end users
  • data mining algorithms
  • uniformly distributed
  • distributed data