Login / Signup

Security analysis of a publicly verifiable data possession scheme for remote storage.

Zhiyan XuLibing WuDebiao HeMuhammad Khurram Khan
Published in: J. Supercomput. (2017)
Keyphrases
  • security analysis
  • data sources
  • data structure
  • data points
  • data distribution
  • data objects
  • remote server