Artykuły w czasopismach na temat „Outsource Proof Of Retrievability”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Outsource Proof Of Retrievability”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Paterson, Maura B., Douglas R. Stinson, and Jalaj Upadhyay. "Multi-prover proof of retrievability." Journal of Mathematical Cryptology 12, no. 4 (2018): 203–20. http://dx.doi.org/10.1515/jmc-2018-0012.
Pełny tekst źródłaYuan, Zhonghao, Jiaojiao Wu, Jianpeng Gong, Yao Liu, Guohua Tian, and Jianfeng Wang. "Blockchain-Based Self-Auditing Scheme with Batch Verification for Decentralized Storage." Wireless Communications and Mobile Computing 2022 (June 26, 2022): 1–13. http://dx.doi.org/10.1155/2022/6998046.
Pełny tekst źródłaShubham, Pote1 Vipul Jain2 Rutuja Shinde3 Prasanna Paigude4 Prof.Deepali Ahir 5. "OPOR: PROOF OF RETRIEVABILITY IN CLOUD COMPUTING WITH RECOVERY AND REMOTE INTEGRITY CHECK." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 6 (2017): 58–65. https://doi.org/10.5281/zenodo.802818.
Pełny tekst źródłaAlomari, Sara, Mona Alghamdi, and Fahd S. Alotaibi. "Enhancing Big Data Auditing." Computer and Information Science 11, no. 1 (2018): 90. http://dx.doi.org/10.5539/cis.v11n1p90.
Pełny tekst źródłaRao, Lu, Tengfei Tu, Hua Zhang, Qiaoyan Wen, and Jia Xiao. "Dynamic Outsourced Proofs of Retrievability Enabling Auditing Migration for Remote Storage Security." Wireless Communications and Mobile Computing 2018 (2018): 1–19. http://dx.doi.org/10.1155/2018/4186243.
Pełny tekst źródłaRen, Yan, Haipeng Guan, Qiuxia Zhao, and Zongxiang Yi. "Blockchain-Based Proof of Retrievability Scheme." Security and Communication Networks 2022 (February 3, 2022): 1–8. http://dx.doi.org/10.1155/2022/3186112.
Pełny tekst źródłaDumas, Jean-Guillaume, Aude Maignan, Clément Pernet, and Daniel S. Roche. "VESPo: Verified Evaluation of Secret Polynomials (with application to dynamic proofs of retrievability)." Proceedings on Privacy Enhancing Technologies 2023, no. 3 (2023): 354–74. http://dx.doi.org/10.56553/popets-2023-0085.
Pełny tekst źródłaShao, Zhi Yi, and Bo Yang. "Proof of retrievability with efficient verification." International Journal of Embedded Systems 7, no. 3/4 (2015): 203. http://dx.doi.org/10.1504/ijes.2015.072365.
Pełny tekst źródłaLiu, Liming, and Dexin Yang. "A novel zero knowledge proof of retrievability." International Journal of Autonomous and Adaptive Communications Systems 13, no. 1 (2020): 1. http://dx.doi.org/10.1504/ijaacs.2020.10025882.
Pełny tekst źródłaYang, Dexin, and Liming Liu. "A novel zero knowledge proof of retrievability." International Journal of Autonomous and Adaptive Communications Systems 13, no. 1 (2020): 1. http://dx.doi.org/10.1504/ijaacs.2020.104157.
Pełny tekst źródłaJianchao, Bian, Liu Huixia, Luo Shoushan, Zha Yaxing, and Li Wei. "Proof of retrievability based on LDPC codes." Journal of China Universities of Posts and Telecommunications 22, no. 4 (2015): 17–25. http://dx.doi.org/10.1016/s1005-8885(15)60663-x.
Pełny tekst źródłaKapis, Kosmas, and Baraka Mwasampeta. "Implementation of Proof of Retrievability on the Cloud." International Journal of Digital Information and Wireless Communications 9, no. 3 (2019): 157–64. http://dx.doi.org/10.17781/p002622.
Pełny tekst źródłaDARUBHAIGARI, ALI AHAMMED. "IMPROVING THE PROOF OF RETRIEVABILITY IN CLOUD COMPUTING." i-manager’s Journal on Cloud Computing 3, no. 2 (2016): 25. http://dx.doi.org/10.26634/jcc.3.2.8167.
Pełny tekst źródłaLavauzelle, Julien, and Françoise Levy-dit-Vehel. "Generic constructions of PoRs from codes and instantiations." Journal of Mathematical Cryptology 13, no. 2 (2019): 81–106. http://dx.doi.org/10.1515/jmc-2018-0018.
Pełny tekst źródłaNarayan Kulkarni, Neha, Shital Kumar A. Jain, and . "Survey on Data Integrity, Recovery, and Proof of Retrievability Techniques in Cloud Storage." International Journal of Engineering & Technology 7, no. 3.6 (2018): 55. http://dx.doi.org/10.14419/ijet.v7i3.6.14938.
Pełny tekst źródłaZhang, Jianhong, Wenjing Tang, and Jian Mao. "Efficient public verification proof of retrievability scheme in cloud." Cluster Computing 17, no. 4 (2014): 1401–11. http://dx.doi.org/10.1007/s10586-014-0394-8.
Pełny tekst źródłaSumathi, Dorraikannan, and S. Kathik. "Proof of Retrievability Using Elliptic Curve Digital Signature in Cloud Computing." International Review on Computers and Software (IRECOS) 9, no. 9 (2014): 1526. http://dx.doi.org/10.15866/irecos.v9i9.2200.
Pełny tekst źródłaLin, Jyh-Shyan, Kuo-Hsiung Liao, and Chao-Hsing Hsu. "A Group Collaboratable Proof of Retrievability Scheme for Cloud Data Storage." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 7 (2014): 4625–32. http://dx.doi.org/10.24297/ijct.v13i7.2501.
Pełny tekst źródłaCui, Hui, Man Ho Au, and Yi Mu. "Proof of retrievability with public verifiability resilient against related-key attacks." IET Information Security 9, no. 1 (2015): 43–49. http://dx.doi.org/10.1049/iet-ifs.2013.0322.
Pełny tekst źródłaBeng, Tan Choon, Mohd Hanafi Ahmad Hijazi, and Yuto Lim. "An Optimization Approach Towards a Proof of Retrievability Scheme for Cloud Storage." Advanced Science Letters 24, no. 3 (2018): 1812–16. http://dx.doi.org/10.1166/asl.2018.11167.
Pełny tekst źródłaLi, Jin, Xiao Tan, Xiaofeng Chen, Duncan S. Wong, and Fatos Xhafa. "OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices." IEEE Transactions on Cloud Computing 3, no. 2 (2015): 195–205. http://dx.doi.org/10.1109/tcc.2014.2366148.
Pełny tekst źródłaChen, Jing, Lihong Zhang, Kun He, Min Chen, Ruiying Du, and Lina Wang. "Message-locked proof of ownership and retrievability with remote repairing in cloud." Security and Communication Networks 9, no. 16 (2016): 3452–66. http://dx.doi.org/10.1002/sec.1553.
Pełny tekst źródłaOmote, Kazumasa, and Tran Phuong Thao. "MD-POR: Multisource and Direct Repair for Network Coding-Based Proof of Retrievability." International Journal of Distributed Sensor Networks 11, no. 6 (2015): 586720. http://dx.doi.org/10.1155/2015/586720.
Pełny tekst źródłaFu, Anmin, Yuhan Li, Shui Yu, Yan Yu, and Gongxuan Zhang. "DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems." Journal of Network and Computer Applications 104 (February 2018): 97–106. http://dx.doi.org/10.1016/j.jnca.2017.12.007.
Pełny tekst źródłaJHO, Nam-Su, Daesung MOON, and Taek-Young YOUN. "Fully Dynamic Data Management in Cloud Storage Systems with Secure Proof of Retrievability." IEICE Transactions on Information and Systems E105.D, no. 11 (2022): 1872–79. http://dx.doi.org/10.1587/transinf.2022ngp0004.
Pełny tekst źródłaOMOTE, Kazumasa, and Phuong-Thao TRAN. "D2-POR: Direct Repair and Dynamic Operations in Network Coding-Based Proof of Retrievability." IEICE Transactions on Information and Systems E99.D, no. 4 (2016): 816–29. http://dx.doi.org/10.1587/transinf.2015icp0014.
Pełny tekst źródłaNema, Shubham, Akash Mittal, and Yogendra Kumar. "Proof of Retrievability in Cloud Computing Environment using Sharing of Key based on Resource." International Journal of Computer Applications 146, no. 12 (2016): 34–38. http://dx.doi.org/10.5120/ijca2016910956.
Pełny tekst źródłaZhang, Jian Hong, and Wen Jing Tang. "Security Analysis on a Public POR Scheme in Cloud Storage." Applied Mechanics and Materials 556-562 (May 2014): 5395–99. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5395.
Pełny tekst źródłaSuryantoro, Waluyo, Widodo Tri, Sumarto Mulyadi, and Sukamdi. "Employment Rights Implementation and Industrial Relations Systems: The Case of the Outsourcing Policy in Banking Industry." International Journal of Case Studies 8, no. 5 (2019): 89–101. https://doi.org/10.5281/zenodo.3547109.
Pełny tekst źródłaAn, Duo, Alan Chiu, James A. Flanders, et al. "Designing a retrievable and scalable cell encapsulation device for potential treatment of type 1 diabetes." Proceedings of the National Academy of Sciences 115, no. 2 (2017): E263—E272. http://dx.doi.org/10.1073/pnas.1708806115.
Pełny tekst źródłaPark, Cheolhee, Hyunil Kim, Dowon Hong, and Changho Seo. "A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments." Security and Communication Networks 2018 (November 1, 2018): 1–16. http://dx.doi.org/10.1155/2018/2193897.
Pełny tekst źródłaYang, Haibin, Zhengge Yi, Xu An Wang, Yunxuan Su, Zheng Tu, and Xiaoyuan Yang. "Improved Lightweight Cloud Storage Auditing Protocol for Shared Medical Data." Wireless Communications and Mobile Computing 2021 (January 8, 2021): 1–13. http://dx.doi.org/10.1155/2021/8886763.
Pełny tekst źródłaYang, Haibin, Zhengge Yi, Xu An Wang, Yunxuan Su, Zheng Tu, and Xiaoyuan Yang. "Improved Lightweight Cloud Storage Auditing Protocol for Shared Medical Data." Wireless Communications and Mobile Computing 2021 (January 8, 2021): 1–13. http://dx.doi.org/10.1155/2021/8886763.
Pełny tekst źródłaOlakanmi, Oladayo Olufemi, and Adedamola Dada. "An Efficient Privacy-preserving Approach for Secure Verifiable Outsourced Computing on Untrusted Platforms." International Journal of Cloud Applications and Computing 9, no. 2 (2019): 79–98. http://dx.doi.org/10.4018/ijcac.2019040105.
Pełny tekst źródłaHu, Ronglei, Ziwei Ma, Li Li, et al. "An Access Control Scheme Based on Blockchain and Ciphertext Policy-Attribute Based Encryption." Sensors 23, no. 19 (2023): 8038. http://dx.doi.org/10.3390/s23198038.
Pełny tekst źródłaLi, Haifeng, Caihui Lan, Xingbing Fu, Caifen Wang, Fagen Li, and He Guo. "A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing." Sensors 20, no. 17 (2020): 4720. http://dx.doi.org/10.3390/s20174720.
Pełny tekst źródłaGoean, Eduard Romulus, Xavier Font, Yu Xiong, et al. "Using the Blockchain to Reduce Carbon Emissions in the Visitor Economy." Sustainability 16, no. 10 (2024): 4000. http://dx.doi.org/10.3390/su16104000.
Pełny tekst źródłaTan, Choon Beng, Mohd Hanafi Ahmad Hijazi, Yuto Lim, and Abdullah Gani. "A survey on Proof of Retrievability for cloud data integrity and availability: Cloud storage state-of-the-art, issues, solutions and future trends." Journal of Network and Computer Applications 110 (May 2018): 75–86. http://dx.doi.org/10.1016/j.jnca.2018.03.017.
Pełny tekst źródłaLi, Ruifeng, Haibin Yang, Xu An Wang, Zhengge Yi, and Ke Niu. "Improved Public Auditing System of Cloud Storage Based on BLS Signature." Security and Communication Networks 2022 (May 29, 2022): 1–9. http://dx.doi.org/10.1155/2022/6800216.
Pełny tekst źródłaJia, Ruijuan, Juan Ma, Ziyin You, and Mingyue Zhang. "Transparent and Privacy-Preserving Mobile Crowd-Sensing System with Truth Discovery." Sensors 25, no. 7 (2025): 2294. https://doi.org/10.3390/s25072294.
Pełny tekst źródłaJibin Joy, Dr. S. Devaraju. "Ensuring Data Integrity And Security In Diverse Cloud Environments To Prevent Duplicacy." Tuijin Jishu/Journal of Propulsion Technology 44, no. 4 (2023): 4803–15. http://dx.doi.org/10.52783/tjjpt.v44.i4.1798.
Pełny tekst źródłaAbdulsada, Ayad I., Dhafer G. Honi, and Salah Al-Darraji. "Efficient multi-keyword similarity search over encrypted cloud documents." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 1 (2021): 510. http://dx.doi.org/10.11591/ijeecs.v23.i1.pp510-518.
Pełny tekst źródłaZhang, Jindan, Urszula Ogiela, David Taniar, and Nadia Nedjah. "Improved cloud storage auditing scheme with deduplication." Mathematical Biosciences and Engineering 20, no. 5 (2023): 7905–21. http://dx.doi.org/10.3934/mbe.2023342.
Pełny tekst źródłaAbdulsada, Ayad I., Dhafer G. Honi, and Salah Al-Darraji. "Efficient multi-keyword similarity search over encrypted cloud documents." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 1 (2021): 510–18. https://doi.org/10.11591/ijeecs.v23.i1.pp510-518.
Pełny tekst źródłaKo, Po-Han, Yu-Ling Hsueh, and Chih-Wen Hsueh. "A Low-Storage Blockchain Framework Based on Incentive Pricing Strategies." FinTech 1, no. 3 (2022): 250–75. http://dx.doi.org/10.3390/fintech1030020.
Pełny tekst źródłaAbdul Aziz, Mohammad Azhan, Abd Latif Abdul Rahman, Mohd Abdul Hafiz Md Radzi, and Asmad Rizal Umar. "THE POTENTIAL AND BENEFITS OF COMMERCIAL RECORDS CENTERS FOR BUSINESS COMPANIES IN MALAYSIA: A CONCEPTUAL PAPER." Advanced International Journal of Business, Entrepreneurship and SMEs 6, no. 19 (2024): 276–88. http://dx.doi.org/10.35631/aijbes.619020.
Pełny tekst źródłaSlobodzianyk, Roman, and Natalia Chornopyska. "E-commerce logistics: supply chain resilience." Management and Entrepreneurship in Ukraine: the stages of formation and problems of development 2024, no. 1 (2024): 145–52. http://dx.doi.org/10.23939/smeu2024.01.145.
Pełny tekst źródłaZara, Maham, Shuzhen Wang, and Hasan Ul Moin. "Blockchain-Based Verifiable Computation: A Review." Proceedings of the Pakistan Academy of Sciences: A. Physical and Computational Sciences 61, no. 2 (2024): 113–28. http://dx.doi.org/10.53560/ppasa(61-2)850.
Pełny tekst źródłaCui, Hui, Zhiguo Wan, Rui Gao, and Huaqun Wang. "Outsourced Privately Verifiable Proofs of Retrievability Via Blockchain." IEEE Transactions on Dependable and Secure Computing, 2023, 1–18. http://dx.doi.org/10.1109/tdsc.2023.3285218.
Pełny tekst źródłaChen, Xiuyuan, Chao Lin, Wei Wu, and Debiao He. "A General Blockchain-Based Automatic Audit Scheme For Proofs Of Retrievability." Computer Journal, January 27, 2024. http://dx.doi.org/10.1093/comjnl/bxae001.
Pełny tekst źródła