Results 211 to 220 of about 24,134 (292)

What We Can Learn About Emotion by Talking With the Hadza. [PDF]

open access: yesPerspect Psychol Sci
Hoemann K   +7 more
europepmc   +1 more source

Scalable and efficient provable data possession

Proceedings of the 4th international conference on Security and privacy in communication netowrks, 2008
Storage outsourcing is a rising trend which prompts a number of interesting security issues, many of which have been extensively investigated in the past. However, Provable Data Possession (PDP) is a topic that has only recently appeared in the research literature.
ATENIESE, GIUSEPPE   +3 more
openaire   +4 more sources

Enhancement of provable data possession algorithm

AIP Conference Proceedings, 2023
K. Kishore Kumar   +3 more
openaire   +2 more sources

Revisiting “online/offline provable data possession” schemes

Computer Standards & Interfaces
Feng Wang, Changlu Lin, Manli Yuan
openaire   +2 more sources

Provable Data Possession with Outsourced Data Transfer

IEEE Transactions on Services Computing, 2021
With the rapid development of cloud computing, more and more enterprises would like to upload and store their data in the public cloud. When the parts of the business of an enterprise are purchased by another enterprise, the corresponding data will be transferred to the acquiring enterprise.
Huaqun Wang   +4 more
openaire   +1 more source

A Certificateless Provable Data Possession Scheme for Cloud-Based EHRs

IEEE Transactions on Information Forensics and Security, 2023
Electronic health records (EHRs: digital collections of patient health status and diagnosis) are generally shared, analyzed and stored on cloud servers.
Jiayan Shen   +3 more
semanticscholar   +1 more source

Certificateless Provable Data Possession Scheme With Provable Security in the Standard Model Suitable for Cloud Storage

IEEE Transactions on Services Computing, 2023
Provable data possession (PDP) solves the problem of determining whether the data stored in the cloud is maintained in its entirety. Certificateless cryptography simultaneously tackles two challenges: certificate management and key escrow.
Lunzhi Deng   +4 more
semanticscholar   +1 more source

Certificateless Provable Data Possession Scheme Suitable for Smart Grid Management Systems

IEEE Systems Journal, 2023
A large amount of data are generated at each section of the smart grid. Safely and efficiently storing and managing this data is a crucial challenge faced by the smart grid.
Lunzhi Deng   +4 more
semanticscholar   +1 more source

Comments on "An Efficient Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage"

IEEE Transactions on Information Forensics and Security, 2023
This article addresses some security issues of an identity-based provable data possession protocol with compressed cloud storage (Yang et al., 2022). Some serious flaws are identified and an attack to the protocol is designed.
Lidong Han, Guangwu Xu, Qianna Xie
semanticscholar   +1 more source

IoT-Enabled Cloud-Based Fair Provable Data Possession Scheme based on Blockchain

2023 Second International Conference On Smart Technologies For Smart Nation (SmartTechCon), 2023
In traditional Provable Data Possession (PDP) schemes, the assumption of client honesty has posed a significant challenge, undermining the system's fairness.
Haewon Byeon   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy