Author of the publication

Efficient Dynamic Replicated Data Possession Checking in Distributed Cloud Storage Systems.

, , , and . IJDSN, 12 (1): 1894713:1-1894713:11 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Video Watermarking Algorithm of H.264/AVC for Content Authentication., , , , and . J. Networks, 7 (8): 1150-1154 (2012)An improved algorithm for community discovery in social networks based on label propagation., and . FSKD, page 1493-1497. IEEE, (2015)Efficiently secure multiparty computation based on homomorphic encryption., , , and . CCIS, page 343-349. IEEE, (2016)Invisible Steganography via Generative Adversarial Network., , and . CoRR, (2018)Controlled remote state preparation of arbitrary two and three qubit states via the Brown state., , , , and . Quantum Inf. Process., 11 (6): 1653-1667 (2012)Optimal full-duplex relay selection for physical layer security in cooperative wireless networks., , and . ICCC, page 1-6. IEEE, (2017)One Prediction Model Based on BP Neural Network for Newcastle Disease., , , , and . CCTA (2), volume 294 of IFIP Advances in Information and Communication Technology, page 1209-1216. Springer, (2008)Efficient data possession-checking protocol with deduplication in cloud., , , , and . IJDSN, (2017)Cone-beam computed tomography study of root and canal morphology of mandibular premolars in a western Chinese population., , , , , , and . BMC Medical Imaging, (2012)Two statistical traffic features for certain APT group identification., , , , , , , and . J. Inf. Secur. Appl., (2022)