Статті в журналах з теми "Provable data possession (PDP)"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Provable data possession (PDP)".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Li, Bin, Chen Lei Cao, Jian Yi Liu, and Jin Xia Wei. "A New Delegation Provable Data Possession in Public Cloud Storage." Applied Mechanics and Materials 644-650 (September 2014): 2239–44. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2239.
Повний текст джерелаJayaraman, Indumathi, and Mokhtar Mohammed. "Secure Privacy Conserving Provable Data Possession (SPC-PDP) framework." Information Systems and e-Business Management 18, no. 3 (August 2, 2019): 351–77. http://dx.doi.org/10.1007/s10257-019-00417-8.
Повний текст джерелаZhou, Fucai, Su Peng, Jian Xu, and Zifeng Xu. "Identity-Based Batch Provable Data Possession with Detailed Analyses." International Journal of Foundations of Computer Science 28, no. 06 (September 2017): 743–60. http://dx.doi.org/10.1142/s0129054117400160.
Повний текст джерелаZhou, Caixue. "A Certificate-Based Provable Data Possession Scheme in the Standard Model." Security and Communication Networks 2021 (September 2, 2021): 1–12. http://dx.doi.org/10.1155/2021/9974485.
Повний текст джерелаAlomari, Sara, Mona Alghamdi, and Fahd S. Alotaibi. "Enhancing Big Data Auditing." Computer and Information Science 11, no. 1 (January 27, 2018): 90. http://dx.doi.org/10.5539/cis.v11n1p90.
Повний текст джерелаMathiyalahan, Subasri, Shobana Manivannan, Mahalakshmi Nagasundaram, and R. Ezhilarasie. "Data Integrity Verification Using MPT (Merkle Patricia Tree) in Cloud Computing." International Journal of Engineering & Technology 7, no. 2.24 (April 25, 2018): 500. http://dx.doi.org/10.14419/ijet.v7i2.24.12146.
Повний текст джерелаYan, Hao, Yanan Liu, Zheng Zhang, and Qian Wang. "Efficient Privacy-Preserving Certificateless Public Auditing of Data in Cloud Storage." Security and Communication Networks 2021 (May 27, 2021): 1–11. http://dx.doi.org/10.1155/2021/6639634.
Повний текст джерелаRani, R. Santha Maria, and Dr Lata Ragha. "Dynamic Public Data Auditing Schemes on Cloud: A Survey." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 1 (January 30, 2018): 76. http://dx.doi.org/10.23956/ijarcsse.v8i1.518.
Повний текст джерелаYang, Hanzhe, Ruidan Su, Pei Huang, Yuhan Bai, Kai Fan, Kan Yang, Hui Li, and Yintang Yang. "PMAB: A Public Mutual Audit Blockchain for Outsourced Data in Cloud Storage." Security and Communication Networks 2021 (June 1, 2021): 1–11. http://dx.doi.org/10.1155/2021/9993855.
Повний текст джерелаTang, Fei, Zhuo Feng, Qianhong Gong, Yonghong Huang, and Dong Huang. "Privacy-Preserving Scheme in the Blockchain Based on Group Signature with Multiple Managers." Security and Communication Networks 2021 (November 24, 2021): 1–8. http://dx.doi.org/10.1155/2021/7094910.
Повний текст джерелаChamoli, Ankit, and Anshika Goyal. "Data Integrity and Performance Comparison of New Type- Based Proxy Re-encryption (TB-PRE) and Provable Data Possession (PDP) in Mobile Cloud Computing." International Journal of Computer Sciences and Engineering 6, no. 5 (May 31, 2018): 1123–28. http://dx.doi.org/10.26438/ijcse/v6i5.11231128.
Повний текст джерелаYuan, Zhonghao, Jiaojiao Wu, Jianpeng Gong, Yao Liu, Guohua Tian, and Jianfeng Wang. "Blockchain-Based Self-Auditing Scheme with Batch Verification for Decentralized Storage." Wireless Communications and Mobile Computing 2022 (June 26, 2022): 1–13. http://dx.doi.org/10.1155/2022/6998046.
Повний текст джерелаDeng, Zuojie, and Jingli Zhou. "P3DP: privacy preserving provable data possession with multi-copy and data dynamics in a cloud storage." Journal of Intelligent & Fuzzy Systems 31, no. 2 (July 22, 2016): 1065–78. http://dx.doi.org/10.3233/jifs-169035.
Повний текст джерелаErway, C. Chris, Alptekin Küpçü, Charalampos Papamanthou, and Roberto Tamassia. "Dynamic Provable Data Possession." ACM Transactions on Information and System Security 17, no. 4 (April 24, 2015): 1–29. http://dx.doi.org/10.1145/2699909.
Повний текст джерелаWang, Yujue, Qianhong Wu, Bo Qin, Shaohua Tang, and Willy Susilo. "Online/Offline Provable Data Possession." IEEE Transactions on Information Forensics and Security 12, no. 5 (May 2017): 1182–94. http://dx.doi.org/10.1109/tifs.2017.2656461.
Повний текст джерелаShuang, Tan, Jian Feng Zhang, and Zhi Kun Chen. "Provable Data Possession in Cloud Computing." Applied Mechanics and Materials 513-517 (February 2014): 1406–13. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1406.
Повний текст джерелаYi, Mingxu, Lifeng Wang, and Jinxia Wei. "Distributed data possession provable in cloud." Distributed and Parallel Databases 35, no. 1 (September 30, 2016): 1–21. http://dx.doi.org/10.1007/s10619-016-7190-9.
Повний текст джерелаAteniese, Giuseppe, Randal Burns, Reza Curtmola, Joseph Herring, Osama Khan, Lea Kissner, Zachary Peterson, and Dawn Song. "Remote data checking using provable data possession." ACM Transactions on Information and System Security 14, no. 1 (May 2011): 1–34. http://dx.doi.org/10.1145/1952982.1952994.
Повний текст джерелаXue, Liang, Jianbing Ni, Yannan Li, and Jian Shen. "Provable data transfer from provable data possession and deletion in cloud storage." Computer Standards & Interfaces 54 (November 2017): 46–54. http://dx.doi.org/10.1016/j.csi.2016.08.006.
Повний текст джерелаZhou, Caixue, Lihua Wang, and Lingmin Wang. "Lattice-based provable data possession in the standard model for cloud-based smart grid data management systems." International Journal of Distributed Sensor Networks 18, no. 4 (April 2022): 155013292210929. http://dx.doi.org/10.1177/15501329221092940.
Повний текст джерелаChen, Lan-xiang. "A Homomorphic Hashing Based Provable Data Possession." Journal of Electronics & Information Technology 33, no. 9 (September 30, 2011): 2199–204. http://dx.doi.org/10.3724/sp.j.1146.2011.00001.
Повний текст джерелаWang, Huaqun. "Proxy Provable Data Possession in Public Clouds." IEEE Transactions on Services Computing 6, no. 4 (October 2013): 551–59. http://dx.doi.org/10.1109/tsc.2012.35.
Повний текст джерелаLi, Yannan, Yong Yu, Ruonan Chen, Xiaojiang Du, and Mohsen Guizani. "IntegrityChain: Provable Data Possession for Decentralized Storage." IEEE Journal on Selected Areas in Communications 38, no. 6 (June 2020): 1205–17. http://dx.doi.org/10.1109/jsac.2020.2986664.
Повний текст джерелаLiu, Yudong, Shuai Xiao, Han Wang, and Xu An Wang. "New provable data transfer from provable data possession and deletion for secure cloud storage." International Journal of Distributed Sensor Networks 15, no. 4 (April 2019): 155014771984249. http://dx.doi.org/10.1177/1550147719842493.
Повний текст джерелаLi, Ming Chu, Liang Zhang, and Cheng Guo. "Accurate Location in Batch Dynamic Provable Data Possession." Applied Mechanics and Materials 519-520 (February 2014): 9–12. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.9.
Повний текст джерелаPeng, Su, Fucai Zhou, Qiang Wang, Zifeng Xu, and Jian Xu. "Identity-Based Public Multi-Replica Provable Data Possession." IEEE Access 5 (2017): 26990–7001. http://dx.doi.org/10.1109/access.2017.2776275.
Повний текст джерелаLi, Chaoling, Yue Chen, Pengxu Tan, and Gang Yang. "Towards comprehensive provable data possession in cloud computing." Wuhan University Journal of Natural Sciences 18, no. 3 (June 2013): 265–71. http://dx.doi.org/10.1007/s11859-013-0926-8.
Повний текст джерелаYang, Haibin, Zhengge Yi, Ruifeng Li, Zheng Tu, Xu An Wang, Yuanyou Cui, and Xiaoyuan Yang. "Improved Outsourced Provable Data Possession for Secure Cloud Storage." Security and Communication Networks 2021 (July 22, 2021): 1–12. http://dx.doi.org/10.1155/2021/1805615.
Повний текст джерелаRen, Yongjun, Jiang Xu, Jin Wang, and Jeong-Uk Kim. "Designated-Verifier Provable Data Possession in Public Cloud Storage." International Journal of Security and Its Applications 7, no. 6 (November 30, 2013): 11–20. http://dx.doi.org/10.14257/ijsia.2013.7.6.02.
Повний текст джерелаBarsoum, Ayad F., and M. Anwar Hasan. "Provable Multicopy Dynamic Data Possession in Cloud Computing Systems." IEEE Transactions on Information Forensics and Security 10, no. 3 (March 2015): 485–97. http://dx.doi.org/10.1109/tifs.2014.2384391.
Повний текст джерелаWang, Huaqun. "Identity-Based Distributed Provable Data Possession in Multicloud Storage." IEEE Transactions on Services Computing 8, no. 2 (March 2015): 328–40. http://dx.doi.org/10.1109/tsc.2014.1.
Повний текст джерелаRen, Yongjun, Jiang Xu, Jin Wang, and Jeong-Uk Kim. "Server Re-Tag Provable Data Possession in Public Cloud." International Journal of Hybrid Information Technology 6, no. 6 (November 30, 2013): 301–10. http://dx.doi.org/10.14257/ijhit.2013.6.6.27.
Повний текст джерелаChen, Ruonan, Yannan Li, Yong Yu, Huilin Li, Xiaofeng Chen, and Willy Susilo. "Blockchain-Based Dynamic Provable Data Possession for Smart Cities." IEEE Internet of Things Journal 7, no. 5 (May 2020): 4143–54. http://dx.doi.org/10.1109/jiot.2019.2963789.
Повний текст джерелаTian, Junfeng, Guo Ruifang, and Xuan Jing. "Stern–Brocot-Based Non-Repudiation Dynamic Provable Data Possession." IEEE Access 7 (2019): 96686–94. http://dx.doi.org/10.1109/access.2019.2916173.
Повний текст джерелаChen, Liang, Lansheng Han, Jiandu Jing, and Dongping Hu. "A post-quantum provable data possession protocol in cloud." Security and Communication Networks 6, no. 5 (February 22, 2013): 658–67. http://dx.doi.org/10.1002/sec.691.
Повний текст джерелаLi, Zhengwen, Yang Xin, De Zhao, and Yixian Yang. "A Noninteractive Multireplica Provable Data Possession Scheme Based on Smart Contract." Security and Communication Networks 2022 (April 6, 2022): 1–14. http://dx.doi.org/10.1155/2022/6268449.
Повний текст джерелаYANG, Jian, Jian WANG, Haihang WANG, and Dengqi YANG. "Agent-based provable data possession scheme for mobile cloud computing." Journal of Computer Applications 33, no. 3 (September 25, 2013): 743–47. http://dx.doi.org/10.3724/sp.j.1087.2013.00743.
Повний текст джерелаLi, Tian, Huaqun Wang, Debiao He, and Jia Yu. "Synchronized Provable Data Possession Based on Blockchain for Digital Twin." IEEE Transactions on Information Forensics and Security 17 (2022): 472–85. http://dx.doi.org/10.1109/tifs.2022.3144869.
Повний текст джерелаA. Abinaya and K. Fathima Bibi. "Identity Based Distributed Provable Data Possession in Multi Cloud Storage." International Journal of Computer Sciences and Engineering 5, no. 8 (August 2017): 17–21. http://dx.doi.org/10.26438/ijcse/v5i8.1721.
Повний текст джерелаYuan, Yilin, Jianbiao Zhang, and Wanshan Xu. "Dynamic Multiple-Replica Provable Data Possession in Cloud Storage System." IEEE Access 8 (2020): 120778–84. http://dx.doi.org/10.1109/access.2020.3006278.
Повний текст джерелаZhang, Yihua, and Marina Blanton. "Efficient Dynamic Provable Possession of Remote Data via Update Trees." ACM Transactions on Storage 12, no. 2 (March 8, 2016): 1–45. http://dx.doi.org/10.1145/2747877.
Повний текст джерелаWang, Huaqun, Debiao He, Jia Yu, and Zhiwei Wang. "Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession." IEEE Transactions on Services Computing 12, no. 5 (September 1, 2019): 824–35. http://dx.doi.org/10.1109/tsc.2016.2633260.
Повний текст джерелаZhu, Yan, Hongxin Hu, Gail-Joon Ahn, and Mengyang Yu. "Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage." IEEE Transactions on Parallel and Distributed Systems 23, no. 12 (December 2012): 2231–44. http://dx.doi.org/10.1109/tpds.2012.66.
Повний текст джерелаRen, Zhengwei, Lina Wang, Ruyi Deng, and Rongwei Yu. "Improved fair and dynamic provable data possession supporting public verification." Wuhan University Journal of Natural Sciences 18, no. 4 (August 2013): 348–54. http://dx.doi.org/10.1007/s11859-013-0941-9.
Повний текст джерелаLuo, Wen Jun, and Lu Liu. "Multi-Replica Dynamic Data Verification for Cloud Computing." Applied Mechanics and Materials 263-266 (December 2012): 2939–44. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.2939.
Повний текст джерелаQi, Yining, Zhen Yang, Yubo Luo, Yongfeng Huang, and Xing Li. "Blockchain-Based Light-Weighted Provable Data Possession for Low Performance Devices." Computers, Materials & Continua 73, no. 2 (2022): 2205–21. http://dx.doi.org/10.32604/cmc.2022.027939.
Повний текст джерелаChaudhari, Smita, and Gandharba Swain. "Towards Lightweight Provable Data Possession for Cloud Storage Using Indistinguishability Obfuscation." IEEE Access 10 (2022): 31607–25. http://dx.doi.org/10.1109/access.2022.3159699.
Повний текст джерелаZha, Yaxing, Shoushan Luo, Jianchao Bian, and Wei Li. "A novel provable data possession scheme based on geographic location attribute." China Communications 13, no. 9 (September 2016): 139–50. http://dx.doi.org/10.1109/cc.2016.7582306.
Повний текст джерелаPeng, Su, Fucai Zhou, Jian Xu, and Zifeng Xu. "Comments on “Identity-Based Distributed Provable Data Possession in Multicloud Storage”." IEEE Transactions on Services Computing 9, no. 6 (November 1, 2016): 996–98. http://dx.doi.org/10.1109/tsc.2016.2589248.
Повний текст джерелаLiu, Meng, Xuyun Zhang, Chi Yang, Qiang He, and Jianbing Zhang. "Curve fitting based efficient parameter selection for robust provable data possession." Journal of Parallel and Distributed Computing 120 (October 2018): 62–76. http://dx.doi.org/10.1016/j.jpdc.2018.05.007.
Повний текст джерела