1. Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey;Abiodun;J. King Saud Univ. Sci.,2022
2. Fault diagnosis schemes for low-energy block cipher midori benchmarked on FPGA;Aghaie;IEEE Trans. Very Large Scale Integr. (VLSI) Syst.,2016
3. Fault attacks on AES and their countermeasures;Ali,2016
4. Anthoine, G., Dumas, J.-G., de Jonghe, M., Maignan, A., Pernet, C., Hanling, M., Roche, D.S., 2021. Dynamic proofs of retrievability with low server storage. In: 30th USENIX Security Symposium. USENIX Security 21, pp. 537–554.
5. Ateniese, G., Di Pietro, R., Mancini, L.V., Tsudik, G., 2008. Scalable and Efficient Provable Data Possession. In: Proc. 4th Int. Conf. Secur. Privacy Commun. Netw.. pp. 1–10.