Author:
Tian Hui,Chen Zhaoyi,Chang Chin-Chen,Kuribayashi Minoru,Huang Yongfeng,Cai Yiqiao,Chen Yonghong,Wang Tian
Funder
National Natural Science Foundation of China
National Natural Science Foundation of China (CN)
Program of China Scholarships Council
Natural Science Foundation of Fujian Province of China
Program for New Century Excellent Talents in Fujian Province University
Program for Outstanding Young Teachers in Higher Education Institutions of Fujian Province of China
Education and Science Research Program for Young and Middle-aged Teachers of Fujian Province of China
Publisher
Springer Science and Business Media LLC
Subject
Geometry and Topology,Theoretical Computer Science,Software
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Exploring the landscape of network security: a comparative analysis of attack detection strategies;Journal of Ambient Intelligence and Humanized Computing;2024-05-05
2. CFAuditChain: Audit BlockChain Based On Cuckoo Filter;The Computer Journal;2024-02-28
3. Trusted Auditing of Data Operation Behaviors in Cloud based on Blockchain and TEE;2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom);2023-12-21
4. Cloud auditing and authentication scheme for establishing privacy preservation;Multimedia Tools and Applications;2023-10-16
5. Public Auditing of Log Integrity for Shared Cloud Storage Systems via Blockchain;Mobile Networks and Applications;2023-07-06