Loading...

Identity-Based Privacy Preserving Remote Data Integrity Checking With a Designated Verifier

The remote data possession checking mechanism can effectively verify the integrity of outsourced data, which can usually be divided into public verification and private verification. The verifier of public verification can be any cloud user, while private verification can only be the data owner. How...

Fuld beskrivelse

Na minha lista:
Bibliografiske detaljer
Main Authors: Genqing Bian, Rui Zhang, Bilin Shao
Format: Artigo
Sprog:Inglês
Udgivet: IEEE 2022-01-01
Serier:IEEE Access
Fag:
Online adgang:https://ieeexplore.ieee.org/document/9755879/
Tags: Tilføj Tag
Ingen Tags, Vær først til at tagge denne postø!