Login / Signup
Security analysis of a publicly verifiable data possession scheme for remote storage.
Zhiyan Xu
Libing Wu
Debiao He
Muhammad Khurram Khan
Published in:
J. Supercomput. (2017)
Keyphrases
</>
security analysis
data sources
data structure
data points
data distribution
data objects
remote server