Results 1 to 10 of about 584,673 (292)

Remote data checking using provable data possession [PDF]

open access: yesACM Transactions on Information and System Security, 2011
We introduce a model for provable data possession (PDP) that can be used for remote data checking: A client that has stored data at an untrusted server can verify that the server possesses the original data without retrieving it.
ATENIESE, GIUSEPPE   +7 more
openaire   +5 more sources

Provable Data Possession using Additive Homomorphic Encryption

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Efficiency, public verification, and robustness are essential characteristics of data possession schemes. The efficiency of such kinds of Provable Data Possession (PDP) schemes is possible due to homomorphic encryption, which is used to verify the ...
Parth Shah, Priteshkumar Prajapati
doaj   +2 more sources

Provable data possession scheme with authentication

open access: yesTongxin xuebao, 2016
To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme
Hao-xing LI   +3 more
doaj   +3 more sources

Data-driven classification of playing styles and match outcome prediction in UEFA Champions League teams [PDF]

open access: yesBiology of Sport
This study proposes a data-driven framework for classifying UEFA champions League teams into possession-based and counterattacking styles and predicting match outcomes based on key performance indicators (KPIs).
Yonghan Zhong   +5 more
doaj   +2 more sources

Multi-replica provable data possession scheme supporting data dynamic updating

open access: yesTongxin xuebao, 2014
Considering the application demand of multiple replicas data security and data dynamic update,a multi-replica provable data possession scheme was proposed to supporting data dynamic updating.The original data file can be dynamically updated using dynamic
Long CHEN, Yu-zhu LUO
doaj   +3 more sources

Medication possession ratio in postmenopausal osteoporotic patients: a cross sectional study [PDF]

open access: yesBrazilian Journal of Pharmaceutical Sciences, 2022
Osteoporosis is a chronic disease of bone that increases risk of low-trauma fracture. Chronic treatment may lead to lower adherence with medication.
Sajjad Haider   +3 more
doaj   +1 more source

A Distributed and Decentralized Certificateless Framework for Reliable Shared Data Auditing for FOG-CPS Networks

open access: yesIEEE Access, 2023
FOG computing enhances communication efficiency by processing data at the network’s edge. In many critical infrastructure (CI) networks, user entities outsource data to the FOG server, but the reliability of the data is a concern.
Manohar Sai Burra, Soumyadev Maity
doaj   +1 more source

Provable data possession at untrusted stores [PDF]

open access: yesProceedings of the 14th ACM conference on Computer and communications security, 2007
We introduce a model for provable data possession (PDP) that allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. The model generates probabilistic proofs of possession by sampling random sets of blocks from the server, which drastically reduces I/O costs.
ATENIESE, GIUSEPPE   +6 more
openaire   +2 more sources

Dynamic Provable Data Possession [PDF]

open access: yesACM Transactions on Information and System Security, 2009
As storage-outsourcing services and resource-sharing networks have become popular, the problem of efficiently proving the integrity of data stored at untrusted servers has received increased attention. In the Provable Data Possession (PDP) model, the client preprocesses the data and then sends them to an untrusted server for storage while ...
Erway, C. Chris   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy