Author:
Pandu Ranga Rao K. V.,Krishna Reddy V.,Yakoob S. K.
Reference15 articles.
1. Li, J., Li, Y.K., Chen, X.F., Lee, P.P.C., Lou, W.: A hybrid cloud approach for secure authorized deduplication. IEEE Trans. Parallel Distrib. Syst. 99, 1206–1216 (2014)
2. de Carvalho, G., Laender, A. H.F., Gonc¸alves, M.A., da Silva, A.S.: A genetic programming approach to record deduplication. IEEE Trans. Knowl. Data Eng. 24, 766–770 (2012)
3. Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-bolted encryption and secure deduplication. In: EUROCRYPT, pp. 296–312 (2013)
4. Bellare, M., Namprempre, C., Neven, G.: Security proofs for character based distinguishing proof and mark plans. J. Cryptol. 22, 1–61 (2009)
5. http://www.peazip.org/copieshash-checksum.html
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献