Author of the publication

Dynamic Proof of Data Possession and Replication With Tree Sharing and Batch Verification in the Cloud.

, , , , , , and . IEEE Trans. Serv. Comput., 15 (4): 1813-1824 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DexX: A Double Layer Unpacking Framework for Android., , , , , and . IEEE Access, (2018)An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption., , , and . CISC, volume 3822 of Lecture Notes in Computer Science, page 302-312. Springer, (2005)Local indistinguishability of multipartite orthogonal product bases., , , , and . Quantum Inf. Process., 16 (11): 276 (2017)Cheat sensitive quantum bit commitment via pre- and post-selected quantum states., , , , and . Quantum Inf. Process., 13 (1): 141-149 (2014)Local distinguishability of maximally entangled states in canonical form., , , , and . Quantum Inf. Process., 14 (10): 3961-3969 (2015)DroidPDF: The Obfuscation Resilient Packer Detection Framework for Android Apps., , , , , and . IEEE Access, (2020)Improved BV-based quantum attack on block ciphers., , , , , and . Quantum Inf. Process., 22 (1): 9 (2023)The general theory of three-party quantum secret sharing protocols over phase-damping channels., , , , and . Quantum Inf. Process., 12 (10): 3291-3304 (2013)Outsourced dynamic provable data possession with batch update for secure cloud storage., , , , , , and . Future Gener. Comput. Syst., (2019)KRTunnel: DNS channel detector for mobile devices., , , , and . Comput. Secur., (2022)