טוען...
Identity-Based Privacy Preserving Remote Data Integrity Checking With a Designated Verifier
The remote data possession checking mechanism can effectively verify the integrity of outsourced data, which can usually be divided into public verification and private verification. The verifier of public verification can be any cloud user, while private verification can only be the data owner. How...
שמור ב:
Main Authors: | , , |
---|---|
פורמט: | Artigo |
שפה: | Inglês |
יצא לאור: |
IEEE
2022-01-01
|
סדרה: | IEEE Access |
נושאים: | |
גישה מקוונת: | https://ieeexplore.ieee.org/document/9755879/ |
תגים: |
הוספת תג
אין תגיות, היה/י הראשונ/ה לתייג את הרשומה!
|