Author of the publication

Dynamic data integrity auditing for secure outsourcing in the cloud.

, , , , , and . Concurr. Comput. Pract. Exp., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ISEK: An Information Security Knowledge Graph for CISP Knowledge System., , , , and . ICITCS, page 1-4. IEEE Computer Society, (2015)An Android malware detection method based on AndroidManifest file., , , , and . CCIS, page 239-243. IEEE, (2016)Phishing sites detection based on Url Correlation., , , , , and . CCIS, page 244-248. IEEE, (2016)An attack pattern mining algorithm based on fuzzy logic and sequence pattern., , , , , and . CCIS, page 234-238. IEEE, (2016)An Improved Fuzzy Test of Industrial Control System., , , and . ICCAE, page 233-237. ACM, (2018)Research on Ontology-Based Multi-source Engineering Information Retrieval in Integrated Environment of Enterprise., , and . IESA, page 277-282. IEEE Computer Society, (2009)Dynamic data integrity auditing for secure outsourcing in the cloud., , , , , and . Concurr. Comput. Pract. Exp., (2017)A Semantic Knowledge Base Construction Method for Information Security., , , , , and . TrustCom, page 803-808. IEEE Computer Society, (2014)Efficiently secure multiparty computation based on homomorphic encryption., , , and . CCIS, page 343-349. IEEE, (2016)Efficient data possession-checking protocol with deduplication in cloud., , , , and . IJDSN, (2017)