Author of the publication

Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage.

, , , and . ICICS, volume 11149 of Lecture Notes in Computer Science, page 445-458. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hybrid Alarm Association Method Based on AP Clustering and Causality., , , , and . Wirel. Commun. Mob. Comput., (2021)Ontology and Weighted D-S Evidence Theory-Based Vulnerability Data Fusion Method., , , , , and . J. Univers. Comput. Sci., 25 (3): 203-221 (2019)Application of Grid Technologies in Linux Host Intrusion Detection System., and . CSO (1), page 13-17. IEEE Computer Society, (2009)Localization in Wireless Sensor Networks via Support Vector Regression., , and . WGEC, page 549-552. IEEE Computer Society, (2009)An Ant Colony Clustering Routing Algorithm for Wireless Sensor Networks., , and . WGEC, page 670-673. IEEE Computer Society, (2009)A new scheme for improving the utilisation of nested-cloud resources., , and . Int. J. Embed. Syst., 11 (2): 170-181 (2019)GO-CP-ABE: group-oriented ciphertext-policy attribute-based encryption., , , and . Int. J. Embed. Syst., 10 (1): 62-70 (2018)An Improved Parallel Network Traffic Anomaly Detection Method Based on Bagging and GRU., , , , and . WASA (1), volume 12384 of Lecture Notes in Computer Science, page 420-431. Springer, (2020)Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage., , , and . ICICS, volume 11149 of Lecture Notes in Computer Science, page 445-458. Springer, (2018)Efficient publicly verifiable conjunctive keyword search over encrypted data in cloud computing., , and . Int. J. Embed. Syst., 11 (6): 707-718 (2019)