Načítá se...

Identity-Based Privacy Preserving Remote Data Integrity Checking With a Designated Verifier

The remote data possession checking mechanism can effectively verify the integrity of outsourced data, which can usually be divided into public verification and private verification. The verifier of public verification can be any cloud user, while private verification can only be the data owner. How...

Celý popis

Uloženo v:
Podrobná bibliografie
Hlavní autoři: Genqing Bian, Rui Zhang, Bilin Shao
Médium: Artigo
Jazyk:Inglês
Vydáno: IEEE 2022-01-01
Edice:IEEE Access
Témata:
On-line přístup:https://ieeexplore.ieee.org/document/9755879/
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo otaguje tento záznam!