Author of the publication

Collaborative Outsourced Data Integrity Checking in Multi-Cloud Environment.

, , , , and . WASA, volume 9798 of Lecture Notes in Computer Science, page 511-523. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IPad: ID-based public auditing for the outsourced data in the standard model., , and . Clust. Comput., 19 (1): 127-138 (2016)Detecting injected behaviors in HTML5-based Android applications., , , and . J. High Speed Networks, 22 (1): 15-34 (2016)Controllable Crystallization of CH3NH3Sn0.25Pb0.75I3 Perovskites for Hysteresis-Free Solar Cells with Efficiency Reaching 15.2%, , , , , and . Advanced Functional Materials, 27 (11): n/a--n/a (2017)Cloud-based Multi-core Architecture against DNS Attacks., , , , , and . ICCSE, page 391-393. IEEE, (2019)PERM-GUARD: Authenticating the Validity of Flow Rules in Software Defined Networking., , , , and . CSCloud, page 127-132. IEEE Computer Society, (2015)Collaborative Outsourced Data Integrity Checking in Multi-Cloud Environment., , , , and . WASA, volume 9798 of Lecture Notes in Computer Science, page 511-523. Springer, (2016)Blind source separation of electromagnetic signals based on one-dimensional U-Net., , and . EITCE, page 1597-1602. ACM, (2022)Research on image enhancement algorithm based on Retinex theory., and . EITCE, page 361-365. ACM, (2020)Sliding-exponential window RLS algorithm and its square-root method's DFE for the TDMA digital mobile radio., , , and . PIMRC, page 223-227. (1995)Toward Exposing Timing-Based Probing Attacks in Web Applications., , , , and . WASA, volume 9798 of Lecture Notes in Computer Science, page 499-510. Springer, (2016)