Reference16 articles.
1. Liu, F., Tong, J., Mao, J., Rudall, et al.: (1995).
https://doi.org/10.6028/NIST.SP.500-292
2. Lecture Notes in Electrical Engineering,2014
3. Zhang, X., Du, H.T., Chen, J.Q., et al.: Ensure data security in cloud storage. In: Proceedings–2011 International Conference on Network Computing and Information Security NCIS 2011, vol. 1, pp. 284–287 (2011).
https://doi.org/10.1109/NCIS.2011.64
4. Ateniese, G., Burns, R., Curtmola, R., et al.: Provable Data Possession at Untrusted Stores, p. 598 (2007).
https://doi.org/10.1145/1315245.1315318
5. Bala, I., Bishnoi, S.: Research paper on data integrity checking in cloud computing. Int. J. Enhanc. Res. Manag. Comput. Appl. 4, 2319–7471 (2015)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献