Author of the publication

New Publicly Verifiable Data Deletion Supporting Efficient Tracking for Cloud Storage.

, , and . Int. J. Netw. Secur., 22 (5): 885-896 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Outsourced Data Deletion Scheme with Public Verifiability., , , and . WASA, volume 11604 of Lecture Notes in Computer Science, page 631-638. Springer, (2019)Publicly verifiable data transfer and deletion scheme for cloud storage., , and . IJDSN, (2019)Data Integrity Checking Supporting Reliable Data Migration in Cloud Storage., , , and . WASA (1), volume 12384 of Lecture Notes in Computer Science, page 615-626. Springer, (2020)Graph database-based network security situation awareness data storage method., , , , and . EURASIP J. Wirel. Commun. Netw., (2018)Provable data deletion from efficient data integrity auditing and insertion in cloud storage., , , and . Comput. Stand. Interfaces, (2022)Study on Path Planning of Multi-storey Parking Lot Based on Combined Loss Function., , , , , , and . ICIC (3), volume 13395 of Lecture Notes in Computer Science, page 234-241. Springer, (2022)Industrial Wireless Internet Zero Trust Model: Zero Trust Meets Dynamic Federated Learning with Blockchain., , , , , and . IEEE Wirel. Commun., 31 (2): 22-29 (April 2024)Gated recurrent unit-based parallel network traffic anomaly detection using subagging ensembles., , , , , , and . Ad Hoc Networks, (2021)Publicly verifiable outsourced data migration scheme supporting efficient integrity checking., , , and . J. Netw. Comput. Appl., (2021)Security and privacy protection technologies in securing blockchain applications., , , , , and . Inf. Sci., (October 2023)