Login / Signup
A hill cipher-based remote data possession checking in cloud storage.
Lanxiang Chen
Gongde Guo
Zhen Peng
Published in:
Secur. Commun. Networks (2014)
Keyphrases
</>
data analysis
original data
data sets
high dimensional data
database
computer systems
end users
data mining algorithms
uniformly distributed
distributed data