Author:
Ghallab Abdullatif,Saif Mohammed H.,Mohsen Abdulqader
Reference104 articles.
1. Ateniese G, Burns R, Curtmola R et al (2007) Provable data possession at untrusted stored. In: Proceedings of the 14th ACM conference on computer and communications security. ACM, New York, pp 598–609
2. Shah MA, Baker M, Mogul JC, Swaminathan R (2007) Auditing to keep online storage services honest. In: HOTOS’07: proceedings of the 11th USENIX workshop on hot topics in operating systems, Berkeley, CA, USA, pp 1–6
3. Erway C, Küpçü A, Papamanthou C, Tamassia R (2009) Dynamic provable data possession. In: Proceedings of 16th ACM conference on computer and communication security (CCS), New York, NY, USA, pp 213–222
4. Hao Z, Zhong S, Yu N (2011) A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans Knowl Data Eng 23(9):1432–1437
5. Barsoum AF, Hasan MA (2011) On verifying dynamic multiple data copies over cloud servers. In: Cryptology ePrint Archive, Report 2011/447. http://eprint.iacr.org/
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献