Author of the publication

Secure proof of storage with deduplication for cloud storage systems.

, , , and . Multim. Tools Appl., 76 (19): 19363-19378 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems., , and . ACM Comput. Surv., 49 (4): 74:1-74:38 (2017)Differentially private client-side data deduplication protocol for cloud storage services., and . Secur. Commun. Networks, 8 (12): 2114-2123 (2015)Efficient and Secure File Deduplication in Cloud Storage., and . IEICE Trans. Inf. Syst., 97-D (2): 184-197 (2014)Association of DeepLearning-Based Fundus Age Difference with Carotid Atherosclerosis and Mortality., , , , , , , , , and 4 other author(s). BIBM, page 1179-1181. IEEE, (2019)MiGuard : Detecting and Guarding against Malicious Iframe through API Hooking., , , and . IEICE Electron. Express, 8 (7): 460-465 (2011)Scalable and efficient approach for secure group communication using proxy cryptography., and . Wirel. Networks, 18 (4): 413-425 (2012)Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage., , , , and . CCS, page 131-145. ACM, (2018)Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage., , , and . ICDE, page 69-70. IEEE Computer Society, (2017)Decentralized group key management for dynamic networks using proxy cryptography., , and . Q2SWinet, page 123-129. ACM, (2007)Security weakness in the Proof of Storage with Deduplication., , and . IACR Cryptology ePrint Archive, (2012)