Author:
Esai Malar E.,Paramasivan B.
Reference22 articles.
1. Wenting, S, Jing, Q., Jia, Y., Rong, H., Jiankun, H.: Enabling Identity-Based Integrity Auditing and DataSharing With Sensitive Information Hiding for Secure Cloud Storage. In: IEEE Transactions on Information Forensics and Security, vol. 14, no. 2 (2019)
2. Wang, H., He, D., Yu, J., Wang, Z.: Incentive and unconditionally anonymous identity-based public provable data possession. IEEE Trans. Serv. Comput., vol.12, 5 (2019)
3. Zhang, Y., Yu, R., Hao, C., Wang, C., Ren, K.: Enabling efficient user revocation in identity-based cloud storage auditing for shared big data. IEEE Trans. Depend. Sec. Comput., vol.17, no.3 (2020)
4. Yu, Y., et al.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Security 12(4), 767–778 (2017)
5. Yu, J., Wang, H.: Strong key-exposure resilient auditing for secure cloud storage. IEEE Trans. Inf. Forensics Security 12(8), 1931–1940 (Aug. 2017)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献