Publisher
Springer Science and Business Media LLC
Reference36 articles.
1. Arapinis, M., Bursuc, S., & Ryan, M. (2013). Privacy-supporting cloud computing by in-browser key translation. Journal of Computer Security, 21(6), 847–880.
2. Kumar, N., Mathuria, A.: Improved write access control and stronger freshness guarantee to outsourced data. In: Proceedings of the 18th International Conference on Distributed Computing and Networking, pp. 1–8 (2017)
3. G Filho, D.L., Barreto, P.S.L.M.: Demonstrating data possession and uncheatable data transfer. cryptology ePrint Archive (2006)
4. Garg, N., Bawa, S., Kumar, N.: An efficient data integrity auditing protocol for cloud computing. FGCS (2020)
5. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D. (2007). Provable data possession at untrusted stores. In Proceedings of the 14th ACM conference on computer and communications security (pp. 598–609). ACM.