共 50 条
- [21] Effective Third Party Auditing in Cloud Computing 2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, : 91 - 95
- [22] A Practical Third-Party Auditor Prototype for Cloud Storage Service PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 796 - 799
- [23] A Survey for Secure Communication of Cloud Third Party Authenticator 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 51 - 54
- [24] Provably Secure Data Access Control Protocol for Cloud Computing SYMMETRY-BASEL, 2023, 15 (12):
- [25] Secure pervasive computing without a Trusted Third Party IEEE/ACS INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, PROCEEDINGS, 2004, : 240 - 240
- [26] An anomaly-based framework for mitigating effects of DDoS attacks using a third party auditor in cloud computing environments Cluster Computing, 2020, 23 : 2609 - 2627
- [27] An anomaly-based framework for mitigating effects of DDoS attacks using a third party auditor in cloud computing environments CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (04): : 2609 - 2627
- [29] Secure torage of Data in Cloud Computing 2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 783 - 786
- [30] Secure storage of data in cloud computing (1) School of Computer and Software and Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing; 210044, China, 1600, IEEE Tainan Section; International Society of Management Engineers; JSPS/NSFC/NRF A3 Foresight Program Ultra-Realistic Acoustic Interactive Communication on Next-Generation Internet; Tainan Chapter of IEEE Signal Processing Society; Waseda University (Institute of Electrical and Electronics Engineers Inc.):