Author of the publication

New Publicly Verifiable Data Deletion Supporting Efficient Tracking for Cloud Storage.

, , and . Int. J. Netw. Secur., 22 (5): 885-896 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Publicly verifiable data transfer and deletion scheme for cloud storage., , and . IJDSN, (2019)A New Outsourced Data Deletion Scheme with Public Verifiability., , , and . WASA, volume 11604 of Lecture Notes in Computer Science, page 631-638. Springer, (2019)Data Integrity Checking Supporting Reliable Data Migration in Cloud Storage., , , and . WASA (1), volume 12384 of Lecture Notes in Computer Science, page 615-626. Springer, (2020)Graph database-based network security situation awareness data storage method., , , , and . EURASIP J. Wirel. Commun. Netw., (2018)Provable data deletion from efficient data integrity auditing and insertion in cloud storage., , , and . Comput. Stand. Interfaces, (2022)Study on Path Planning of Multi-storey Parking Lot Based on Combined Loss Function., , , , , , and . ICIC (3), volume 13395 of Lecture Notes in Computer Science, page 234-241. Springer, (2022)Gated recurrent unit-based parallel network traffic anomaly detection using subagging ensembles., , , , , , and . Ad Hoc Networks, (2021)Industrial Wireless Internet Zero Trust Model: Zero Trust Meets Dynamic Federated Learning with Blockchain., , , , , and . IEEE Wirel. Commun., 31 (2): 22-29 (April 2024)Security and privacy protection technologies in securing blockchain applications., , , , , and . Inf. Sci., (October 2023)Publicly verifiable outsourced data migration scheme supporting efficient integrity checking., , , and . J. Netw. Comput. Appl., (2021)