Author:
Liu Meng,Zhang Xuyun,Yang Chi,He Qiang,Zhang Jianbing
Subject
Artificial Intelligence,Computer Networks and Communications,Hardware and Architecture,Theoretical Computer Science,Software
Reference45 articles.
1. Remote data checking using provable data possession;Ateniese;ACM Trans. Inf. Syst. Secur. (TISSEC),2011
2. Provable data possession at untrusted stores;Ateniese,2007
3. Scalable and efficient provable data possession;Ateniese,2008
4. A cloud computing based network monitoring and threat detection system for critical infrastructures;Chen;Big Data Res.,2016
5. Forensics investigation challenges in cloud computing environments;Damshenas,2012
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献