共 50 条
- [31] A Trusted Third Party-based Authentication Scheme in Cloud Computing INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 850 - 856
- [32] Comparison of Privacy-Preserving Models based on a Third-Party Auditor in Cloud Computing 2019 3RD IEEE INTERNATIONAL CONFERENCE ON CLOUD AND FOG COMPUTING TECHNOLOGIES AND APPLICATIONS (IEEE CLOUD SUMMIT 2019), 2019, : 86 - 91
- [33] Ensuring Data Security by AES for Global Software Development in Cloud Computing 2014 INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2014,
- [34] An Effective Integrity Verification Scheme for Ensuring Data Integrity in Cloud Computing INNOVATIONS IN BIO-INSPIRED COMPUTING AND APPLICATIONS, IBICA 2021, 2022, 419 : 42 - 54
- [35] Improving Data Integrity for Data Storage Security in Cloud Computing INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (06): : 75 - 82
- [36] Improving Data Integrity for Data Storage Security in Cloud Computing INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (07): : 61 - 67
- [37] Research on the Data Storage Security based on Cloud Computing PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 326 - 331
- [38] Study on Strategy of Cloud Computing Data Storage Security PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 64 - 67
- [39] A Framework to Ensure Data Storage Security in Cloud Computing 2016 IEEE 7TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS MOBILE COMMUNICATION CONFERENCE (UEMCON), 2016,
- [40] Secure dynamic data storage with Third Party Arbitration in cloud PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2018, : 118 - 122