Author of the publication

Decentralized Data Integrity Verification Model in Untrusted Environment.

, , , , and . APWeb/WAIM (2), volume 10988 of Lecture Notes in Computer Science, page 410-424. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting of PIU Behaviors Based on Discovered Generators and Emerging Patterns from Computer-Mediated Interaction Events., , , and . WAIM, volume 8485 of Lecture Notes in Computer Science, page 277-293. Springer, (2014)Automatic Multi-schema Integration Based on User Preference., , , and . WAIM, volume 6184 of Lecture Notes in Computer Science, page 704-716. Springer, (2010)Weight Based Live Migration of Virtual Machines., , , , , and . PAKDD Workshops, volume 7867 of Lecture Notes in Computer Science, page 543-554. Springer, (2013)Finding the least influenced set in uncertain databases., , and . Inf. Syst., 36 (2): 359-385 (2011)Keyword Search over Distributed Graphs with Compressed Signature., , , , , and . IEEE Trans. Knowl. Data Eng., 29 (6): 1212-1225 (2017)RSkNN: kNN Search on Road Networks by Incorporating Social Influence., , , , and . IEEE Trans. Knowl. Data Eng., 28 (6): 1575-1588 (2016)Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases., , and . IEEE Trans. Knowl. Data Eng., 28 (6): 1560-1574 (2016)Optimized Data Storage Method for Sharding-Based Blockchain., , , and . IEEE Access, (2021)ELM-Based Large-Scale Genetic Association Study via Statistically Significant Pattern., , , , and . IEEE Trans. Syst. Man Cybern. Syst., 49 (10): 2175-2188 (2019)Efficient Subgraph Search over Large Uncertain Graphs., , , and . Proc. VLDB Endow., 4 (11): 876-886 (2011)