Author:
Priyanka J.,Ramakrishnan M.
Reference19 articles.
1. Tian H, Nan F, Jiang H, Chang C-C, Ning J, Huang Y (2019) Public auditing for shared cloud data with efficient and secure group management. Inf Sci 472:107–125
2. Ari AAA, Ngangmo OK, Titouna C, Thiare O, Mohamadou A, Gueroui AM (2019) Enabling privacy and security in cloud of things: architecture, applications, security and privacy challenges. Appl Comput Inform
3. Priyanka J, Ramakrishna M (2020) Performance analysis of attribute based encryption and cloud health data security. In: 2020 4th ınternational conference on ıntelligent computing and control systems (ICICCS), IEEE, pp 989–994
4. Thokchom S, Saikia DK (2020) Privacy preserving integrity checking of shared dynamic cloud data with user revocation. J Inf Secur Appl 50:102427
5. Patil SM, Purushothama BR (2020) Non-transitive and collusion resistant quorum controlled proxy re-encryption scheme for resource constrained networks. J Inf Secur Appl 50:102411