1. An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage.;S. H.Abbdal;Proceedings of the 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS),2016
2. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., & Song, D. (2007). Provable Data Possession at Untrusted Stores. In Proc. 14th ACM Conf. Computer and Comm. Security (CCS ’07) (pp. 598-610). ACM.
3. Security System Analysis in Combination Method: RSA Encryption and Digital Signature Algorithm.;F. J.Aufa;Proceedings of the 2018 4th International Conference on Science and Technology (ICST),2018
4. Boneh, D., Gentry, C., Lynn, B., & Shacham, H. (2003). Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In Proc. 22nd Int’l Conf. Theory and Applications of Cryptographic Techniques: Advances in Cryptology (EUROCRYPT’03) (pp. 416-432). Academic Press.
5. el-Khameesy, N., & Abdel Rahman, H. (2012). A Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems. Journal of Emerging Trends in Computing and Information Sciences, 3(6).