1. Arapinis, M., Bursuc, S., Ryan, M.: Privacy-supporting cloud computing by in-browser key translation. J. Comput. Security 21(6), 847–880 (2013)
2. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Khan, O., Kissner, L., Peterson, Z., Song, D.: Remote data checking using provable data possession. ACM Trans. Inform. Syst. Security (TISSEC) 14(1), 12 (2011)
3. Ateniese, G., Di Pietro, R., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, p. 9. ACM (2008)
4. Banaeian Far, S., Imani Rad, A.: Distributed auditing protocol for blockchain-based transactions using a distributed signature. Secur. Priv. 4(3), e156 (2021)
5. Barsoum, A.F., Hasan, M.A.: Provable possession and replication of data over cloud servers. Centre For Applied Cryptographic Research (CACR), University of Waterloo, Report 32 2010 (2010)