Journal articles on the topic 'Outsource Proof Of Retrievability'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Outsource Proof Of Retrievability.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Paterson, Maura B., Douglas R. Stinson, and Jalaj Upadhyay. "Multi-prover proof of retrievability." Journal of Mathematical Cryptology 12, no. 4 (2018): 203–20. http://dx.doi.org/10.1515/jmc-2018-0012.
Full textYuan, Zhonghao, Jiaojiao Wu, Jianpeng Gong, Yao Liu, Guohua Tian, and Jianfeng Wang. "Blockchain-Based Self-Auditing Scheme with Batch Verification for Decentralized Storage." Wireless Communications and Mobile Computing 2022 (June 26, 2022): 1–13. http://dx.doi.org/10.1155/2022/6998046.
Full textShubham, Pote1 Vipul Jain2 Rutuja Shinde3 Prasanna Paigude4 Prof.Deepali Ahir 5. "OPOR: PROOF OF RETRIEVABILITY IN CLOUD COMPUTING WITH RECOVERY AND REMOTE INTEGRITY CHECK." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 6 (2017): 58–65. https://doi.org/10.5281/zenodo.802818.
Full textAlomari, Sara, Mona Alghamdi, and Fahd S. Alotaibi. "Enhancing Big Data Auditing." Computer and Information Science 11, no. 1 (2018): 90. http://dx.doi.org/10.5539/cis.v11n1p90.
Full textRao, Lu, Tengfei Tu, Hua Zhang, Qiaoyan Wen, and Jia Xiao. "Dynamic Outsourced Proofs of Retrievability Enabling Auditing Migration for Remote Storage Security." Wireless Communications and Mobile Computing 2018 (2018): 1–19. http://dx.doi.org/10.1155/2018/4186243.
Full textRen, Yan, Haipeng Guan, Qiuxia Zhao, and Zongxiang Yi. "Blockchain-Based Proof of Retrievability Scheme." Security and Communication Networks 2022 (February 3, 2022): 1–8. http://dx.doi.org/10.1155/2022/3186112.
Full textDumas, Jean-Guillaume, Aude Maignan, Clément Pernet, and Daniel S. Roche. "VESPo: Verified Evaluation of Secret Polynomials (with application to dynamic proofs of retrievability)." Proceedings on Privacy Enhancing Technologies 2023, no. 3 (2023): 354–74. http://dx.doi.org/10.56553/popets-2023-0085.
Full textShao, Zhi Yi, and Bo Yang. "Proof of retrievability with efficient verification." International Journal of Embedded Systems 7, no. 3/4 (2015): 203. http://dx.doi.org/10.1504/ijes.2015.072365.
Full textLiu, Liming, and Dexin Yang. "A novel zero knowledge proof of retrievability." International Journal of Autonomous and Adaptive Communications Systems 13, no. 1 (2020): 1. http://dx.doi.org/10.1504/ijaacs.2020.10025882.
Full textYang, Dexin, and Liming Liu. "A novel zero knowledge proof of retrievability." International Journal of Autonomous and Adaptive Communications Systems 13, no. 1 (2020): 1. http://dx.doi.org/10.1504/ijaacs.2020.104157.
Full textJianchao, Bian, Liu Huixia, Luo Shoushan, Zha Yaxing, and Li Wei. "Proof of retrievability based on LDPC codes." Journal of China Universities of Posts and Telecommunications 22, no. 4 (2015): 17–25. http://dx.doi.org/10.1016/s1005-8885(15)60663-x.
Full textKapis, Kosmas, and Baraka Mwasampeta. "Implementation of Proof of Retrievability on the Cloud." International Journal of Digital Information and Wireless Communications 9, no. 3 (2019): 157–64. http://dx.doi.org/10.17781/p002622.
Full textDARUBHAIGARI, ALI AHAMMED. "IMPROVING THE PROOF OF RETRIEVABILITY IN CLOUD COMPUTING." i-manager’s Journal on Cloud Computing 3, no. 2 (2016): 25. http://dx.doi.org/10.26634/jcc.3.2.8167.
Full textLavauzelle, Julien, and Françoise Levy-dit-Vehel. "Generic constructions of PoRs from codes and instantiations." Journal of Mathematical Cryptology 13, no. 2 (2019): 81–106. http://dx.doi.org/10.1515/jmc-2018-0018.
Full textNarayan Kulkarni, Neha, Shital Kumar A. Jain, and . "Survey on Data Integrity, Recovery, and Proof of Retrievability Techniques in Cloud Storage." International Journal of Engineering & Technology 7, no. 3.6 (2018): 55. http://dx.doi.org/10.14419/ijet.v7i3.6.14938.
Full textZhang, Jianhong, Wenjing Tang, and Jian Mao. "Efficient public verification proof of retrievability scheme in cloud." Cluster Computing 17, no. 4 (2014): 1401–11. http://dx.doi.org/10.1007/s10586-014-0394-8.
Full textSumathi, Dorraikannan, and S. Kathik. "Proof of Retrievability Using Elliptic Curve Digital Signature in Cloud Computing." International Review on Computers and Software (IRECOS) 9, no. 9 (2014): 1526. http://dx.doi.org/10.15866/irecos.v9i9.2200.
Full textLin, Jyh-Shyan, Kuo-Hsiung Liao, and Chao-Hsing Hsu. "A Group Collaboratable Proof of Retrievability Scheme for Cloud Data Storage." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 7 (2014): 4625–32. http://dx.doi.org/10.24297/ijct.v13i7.2501.
Full textCui, Hui, Man Ho Au, and Yi Mu. "Proof of retrievability with public verifiability resilient against related-key attacks." IET Information Security 9, no. 1 (2015): 43–49. http://dx.doi.org/10.1049/iet-ifs.2013.0322.
Full textBeng, Tan Choon, Mohd Hanafi Ahmad Hijazi, and Yuto Lim. "An Optimization Approach Towards a Proof of Retrievability Scheme for Cloud Storage." Advanced Science Letters 24, no. 3 (2018): 1812–16. http://dx.doi.org/10.1166/asl.2018.11167.
Full textLi, Jin, Xiao Tan, Xiaofeng Chen, Duncan S. Wong, and Fatos Xhafa. "OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices." IEEE Transactions on Cloud Computing 3, no. 2 (2015): 195–205. http://dx.doi.org/10.1109/tcc.2014.2366148.
Full textChen, Jing, Lihong Zhang, Kun He, Min Chen, Ruiying Du, and Lina Wang. "Message-locked proof of ownership and retrievability with remote repairing in cloud." Security and Communication Networks 9, no. 16 (2016): 3452–66. http://dx.doi.org/10.1002/sec.1553.
Full textOmote, Kazumasa, and Tran Phuong Thao. "MD-POR: Multisource and Direct Repair for Network Coding-Based Proof of Retrievability." International Journal of Distributed Sensor Networks 11, no. 6 (2015): 586720. http://dx.doi.org/10.1155/2015/586720.
Full textFu, Anmin, Yuhan Li, Shui Yu, Yan Yu, and Gongxuan Zhang. "DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems." Journal of Network and Computer Applications 104 (February 2018): 97–106. http://dx.doi.org/10.1016/j.jnca.2017.12.007.
Full textJHO, Nam-Su, Daesung MOON, and Taek-Young YOUN. "Fully Dynamic Data Management in Cloud Storage Systems with Secure Proof of Retrievability." IEICE Transactions on Information and Systems E105.D, no. 11 (2022): 1872–79. http://dx.doi.org/10.1587/transinf.2022ngp0004.
Full textOMOTE, Kazumasa, and Phuong-Thao TRAN. "D2-POR: Direct Repair and Dynamic Operations in Network Coding-Based Proof of Retrievability." IEICE Transactions on Information and Systems E99.D, no. 4 (2016): 816–29. http://dx.doi.org/10.1587/transinf.2015icp0014.
Full textNema, Shubham, Akash Mittal, and Yogendra Kumar. "Proof of Retrievability in Cloud Computing Environment using Sharing of Key based on Resource." International Journal of Computer Applications 146, no. 12 (2016): 34–38. http://dx.doi.org/10.5120/ijca2016910956.
Full textZhang, Jian Hong, and Wen Jing Tang. "Security Analysis on a Public POR Scheme in Cloud Storage." Applied Mechanics and Materials 556-562 (May 2014): 5395–99. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5395.
Full textSuryantoro, Waluyo, Widodo Tri, Sumarto Mulyadi, and Sukamdi. "Employment Rights Implementation and Industrial Relations Systems: The Case of the Outsourcing Policy in Banking Industry." International Journal of Case Studies 8, no. 5 (2019): 89–101. https://doi.org/10.5281/zenodo.3547109.
Full textAn, Duo, Alan Chiu, James A. Flanders, et al. "Designing a retrievable and scalable cell encapsulation device for potential treatment of type 1 diabetes." Proceedings of the National Academy of Sciences 115, no. 2 (2017): E263—E272. http://dx.doi.org/10.1073/pnas.1708806115.
Full textPark, Cheolhee, Hyunil Kim, Dowon Hong, and Changho Seo. "A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments." Security and Communication Networks 2018 (November 1, 2018): 1–16. http://dx.doi.org/10.1155/2018/2193897.
Full textYang, Haibin, Zhengge Yi, Xu An Wang, Yunxuan Su, Zheng Tu, and Xiaoyuan Yang. "Improved Lightweight Cloud Storage Auditing Protocol for Shared Medical Data." Wireless Communications and Mobile Computing 2021 (January 8, 2021): 1–13. http://dx.doi.org/10.1155/2021/8886763.
Full textYang, Haibin, Zhengge Yi, Xu An Wang, Yunxuan Su, Zheng Tu, and Xiaoyuan Yang. "Improved Lightweight Cloud Storage Auditing Protocol for Shared Medical Data." Wireless Communications and Mobile Computing 2021 (January 8, 2021): 1–13. http://dx.doi.org/10.1155/2021/8886763.
Full textOlakanmi, Oladayo Olufemi, and Adedamola Dada. "An Efficient Privacy-preserving Approach for Secure Verifiable Outsourced Computing on Untrusted Platforms." International Journal of Cloud Applications and Computing 9, no. 2 (2019): 79–98. http://dx.doi.org/10.4018/ijcac.2019040105.
Full textHu, Ronglei, Ziwei Ma, Li Li, et al. "An Access Control Scheme Based on Blockchain and Ciphertext Policy-Attribute Based Encryption." Sensors 23, no. 19 (2023): 8038. http://dx.doi.org/10.3390/s23198038.
Full textLi, Haifeng, Caihui Lan, Xingbing Fu, Caifen Wang, Fagen Li, and He Guo. "A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing." Sensors 20, no. 17 (2020): 4720. http://dx.doi.org/10.3390/s20174720.
Full textGoean, Eduard Romulus, Xavier Font, Yu Xiong, et al. "Using the Blockchain to Reduce Carbon Emissions in the Visitor Economy." Sustainability 16, no. 10 (2024): 4000. http://dx.doi.org/10.3390/su16104000.
Full textTan, Choon Beng, Mohd Hanafi Ahmad Hijazi, Yuto Lim, and Abdullah Gani. "A survey on Proof of Retrievability for cloud data integrity and availability: Cloud storage state-of-the-art, issues, solutions and future trends." Journal of Network and Computer Applications 110 (May 2018): 75–86. http://dx.doi.org/10.1016/j.jnca.2018.03.017.
Full textLi, Ruifeng, Haibin Yang, Xu An Wang, Zhengge Yi, and Ke Niu. "Improved Public Auditing System of Cloud Storage Based on BLS Signature." Security and Communication Networks 2022 (May 29, 2022): 1–9. http://dx.doi.org/10.1155/2022/6800216.
Full textJia, Ruijuan, Juan Ma, Ziyin You, and Mingyue Zhang. "Transparent and Privacy-Preserving Mobile Crowd-Sensing System with Truth Discovery." Sensors 25, no. 7 (2025): 2294. https://doi.org/10.3390/s25072294.
Full textJibin Joy, Dr. S. Devaraju. "Ensuring Data Integrity And Security In Diverse Cloud Environments To Prevent Duplicacy." Tuijin Jishu/Journal of Propulsion Technology 44, no. 4 (2023): 4803–15. http://dx.doi.org/10.52783/tjjpt.v44.i4.1798.
Full textAbdulsada, Ayad I., Dhafer G. Honi, and Salah Al-Darraji. "Efficient multi-keyword similarity search over encrypted cloud documents." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 1 (2021): 510. http://dx.doi.org/10.11591/ijeecs.v23.i1.pp510-518.
Full textZhang, Jindan, Urszula Ogiela, David Taniar, and Nadia Nedjah. "Improved cloud storage auditing scheme with deduplication." Mathematical Biosciences and Engineering 20, no. 5 (2023): 7905–21. http://dx.doi.org/10.3934/mbe.2023342.
Full textAbdulsada, Ayad I., Dhafer G. Honi, and Salah Al-Darraji. "Efficient multi-keyword similarity search over encrypted cloud documents." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 1 (2021): 510–18. https://doi.org/10.11591/ijeecs.v23.i1.pp510-518.
Full textKo, Po-Han, Yu-Ling Hsueh, and Chih-Wen Hsueh. "A Low-Storage Blockchain Framework Based on Incentive Pricing Strategies." FinTech 1, no. 3 (2022): 250–75. http://dx.doi.org/10.3390/fintech1030020.
Full textAbdul Aziz, Mohammad Azhan, Abd Latif Abdul Rahman, Mohd Abdul Hafiz Md Radzi, and Asmad Rizal Umar. "THE POTENTIAL AND BENEFITS OF COMMERCIAL RECORDS CENTERS FOR BUSINESS COMPANIES IN MALAYSIA: A CONCEPTUAL PAPER." Advanced International Journal of Business, Entrepreneurship and SMEs 6, no. 19 (2024): 276–88. http://dx.doi.org/10.35631/aijbes.619020.
Full textSlobodzianyk, Roman, and Natalia Chornopyska. "E-commerce logistics: supply chain resilience." Management and Entrepreneurship in Ukraine: the stages of formation and problems of development 2024, no. 1 (2024): 145–52. http://dx.doi.org/10.23939/smeu2024.01.145.
Full textZara, Maham, Shuzhen Wang, and Hasan Ul Moin. "Blockchain-Based Verifiable Computation: A Review." Proceedings of the Pakistan Academy of Sciences: A. Physical and Computational Sciences 61, no. 2 (2024): 113–28. http://dx.doi.org/10.53560/ppasa(61-2)850.
Full textCui, Hui, Zhiguo Wan, Rui Gao, and Huaqun Wang. "Outsourced Privately Verifiable Proofs of Retrievability Via Blockchain." IEEE Transactions on Dependable and Secure Computing, 2023, 1–18. http://dx.doi.org/10.1109/tdsc.2023.3285218.
Full textChen, Xiuyuan, Chao Lin, Wei Wu, and Debiao He. "A General Blockchain-Based Automatic Audit Scheme For Proofs Of Retrievability." Computer Journal, January 27, 2024. http://dx.doi.org/10.1093/comjnl/bxae001.
Full text