Author of the publication

Certificateless Provable Data Possession Protocol for the Multiple Copies and Clouds Case.

, and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RTFTL: design and implementation of real-time FTL algorithm for flash memory., , , and . J. Supercomput., 78 (17): 18959-18993 (2022)Certificateless Provable Data Possession Protocol for the Multiple Copies and Clouds Case., and . IEEE Access, (2020)Identity-Based Privacy Preserving Remote Data Integrity Checking With a Designated Verifier., , and . IEEE Access, (2022)Dynamic decision-making strategy of replica number based on data hot., , , , , and . J. Supercomput., 79 (9): 9584-9603 (June 2023)Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property., , , and . Clust. Comput., 25 (1): 337-349 (2022)Real-time portrait image retouching extended from DualBLN., , , , , , , and . Expert Syst. Appl., 238 (Part F): 121958 (March 2024)A survey of research hotspots and frontier trends of recommendation systems from the perspective of knowledge graph., , and . Expert Syst. Appl., (2021)Comment on Ä Lightweight Auditing Service for Shared Data With Secure User Revocation in Cloud Storage"., , , and . IEEE Trans. Serv. Comput., 15 (5): 2633-2634 (2022)Comment on Ä Tag Encoding Scheme Against Pollution Attack to Linear Network Coding"., , , and . IEEE Trans. Parallel Distributed Syst., 31 (11): 2618-2619 (2020)Research on Multifeature Data Routing Strategy in Deduplication., , , , and . Sci. Program., (2020)