Results 21 to 30 of about 584,673 (292)
Identity-Based Public Multi-Replica Provable Data Possession
Cloud storage has been gaining tremendous popularity, which provides facilitative data storage and sharing services for distributed clients. To maximize the availability and reliability, some customers may store multiple replicas of critical data on ...
Su Peng +4 more
doaj +1 more source
Dynamic Multiple-Replica Provable Data Possession in Cloud Storage System
In cloud storage scenarios, data security has received considerably more attention than before. To ensure the reliability and availability of outsourced data and improve disaster resilience and data recovery ability, important data files possessed by ...
Yilin Yuan, Jianbiao Zhang, Wanshan Xu
doaj +1 more source
Online/Offline Provable Data Possession
Provable data possession (PDP) allows a user to outsource data with a guarantee that the integrity can be efficiently verified. Existing publicly verifiable PDP schemes require the user to perform expensive computations, such as modular exponentiations for processing data before outsourcing to the storage server, which is not desirable for weak users ...
Yujue Wang +4 more
openaire +3 more sources
Proxy Provable Data Possession with Key-exposure Resilient [PDF]
More and more clients would like to store their data to public cloud server along with the rapid development of cloud storage.To check the integrity of remote data,researchers proposed provable data possession(PDP).In some cases,the client will be ...
AN Ruicheng, WANG Huaqun
doaj +1 more source
Objective: To further our understanding of religious possession experiences by focusing on personality, cognitive, and quality of life outcomes. Methods: Data collection was undertaken at Umbanda sessions in Brazilian cities.
Roma Delmonte +4 more
doaj +1 more source
On Coding for Cooperative Data Exchange [PDF]
We consider the problem of data exchange by a group of closely-located wireless nodes. In this problem each node holds a set of packets and needs to obtain all the packets held by other nodes. Each of the nodes can broadcast the packets in its possession
Rouayheb, Salim El +2 more
core +1 more source
Cloud Computing has proved to be a boon for many individuals and organizations who cannot afford infrastructure and maintenance cost of resources. But the untrusted nature of Cloud Server (CS) brings many challenges related to security and trust.
Smita Chaudhari, Gandharba Swain
doaj +1 more source
Class, culture and agency: Researching parental voice [PDF]
This paper explores the differential possession and deployment of social, cultural and material resources by parents, and the effect of these processes on their willingness and ability to be involved with and intervene in their children’s school life ...
Martin, Jane, Vincent, Carol
core +2 more sources
Rating Player Actions in Soccer
We present a data-driven model that rates actions of the player in soccer with respect to their contribution to ball possession phases. This study approach consists of two interconnected parts: (i) a trajectory prediction model that is learned from real ...
Uwe Dick, Maryam Tavakol, Ulf Brefeld
doaj +1 more source
Identity-based Key-insulated Provable Multi-copy Data Possession in Multi-cloud Storage [PDF]
Provable data possession(PDP) allows users to verify that their outsourced data is intact without downloading all the data.To improve the availability and security of outsourced data,many users store multiple copies of their data on a single server.In ...
ZHOU Jie, WANG Huaqun
doaj +1 more source

