Results 211 to 220 of about 24,134 (292)
What We Can Learn About Emotion by Talking With the Hadza. [PDF]
Hoemann K +7 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Scalable and efficient provable data possession
Proceedings of the 4th international conference on Security and privacy in communication netowrks, 2008Storage outsourcing is a rising trend which prompts a number of interesting security issues, many of which have been extensively investigated in the past. However, Provable Data Possession (PDP) is a topic that has only recently appeared in the research literature.
ATENIESE, GIUSEPPE +3 more
openaire +4 more sources
Enhancement of provable data possession algorithm
AIP Conference Proceedings, 2023K. Kishore Kumar +3 more
openaire +2 more sources
Revisiting “online/offline provable data possession” schemes
Computer Standards & InterfacesFeng Wang, Changlu Lin, Manli Yuan
openaire +2 more sources
Provable Data Possession with Outsourced Data Transfer
IEEE Transactions on Services Computing, 2021With the rapid development of cloud computing, more and more enterprises would like to upload and store their data in the public cloud. When the parts of the business of an enterprise are purchased by another enterprise, the corresponding data will be transferred to the acquiring enterprise.
Huaqun Wang +4 more
openaire +1 more source
A Certificateless Provable Data Possession Scheme for Cloud-Based EHRs
IEEE Transactions on Information Forensics and Security, 2023Electronic health records (EHRs: digital collections of patient health status and diagnosis) are generally shared, analyzed and stored on cloud servers.
Jiayan Shen +3 more
semanticscholar +1 more source
IEEE Transactions on Services Computing, 2023
Provable data possession (PDP) solves the problem of determining whether the data stored in the cloud is maintained in its entirety. Certificateless cryptography simultaneously tackles two challenges: certificate management and key escrow.
Lunzhi Deng +4 more
semanticscholar +1 more source
Provable data possession (PDP) solves the problem of determining whether the data stored in the cloud is maintained in its entirety. Certificateless cryptography simultaneously tackles two challenges: certificate management and key escrow.
Lunzhi Deng +4 more
semanticscholar +1 more source
Certificateless Provable Data Possession Scheme Suitable for Smart Grid Management Systems
IEEE Systems Journal, 2023A large amount of data are generated at each section of the smart grid. Safely and efficiently storing and managing this data is a crucial challenge faced by the smart grid.
Lunzhi Deng +4 more
semanticscholar +1 more source
IEEE Transactions on Information Forensics and Security, 2023
This article addresses some security issues of an identity-based provable data possession protocol with compressed cloud storage (Yang et al., 2022). Some serious flaws are identified and an attack to the protocol is designed.
Lidong Han, Guangwu Xu, Qianna Xie
semanticscholar +1 more source
This article addresses some security issues of an identity-based provable data possession protocol with compressed cloud storage (Yang et al., 2022). Some serious flaws are identified and an attack to the protocol is designed.
Lidong Han, Guangwu Xu, Qianna Xie
semanticscholar +1 more source
IoT-Enabled Cloud-Based Fair Provable Data Possession Scheme based on Blockchain
2023 Second International Conference On Smart Technologies For Smart Nation (SmartTechCon), 2023In traditional Provable Data Possession (PDP) schemes, the assumption of client honesty has posed a significant challenge, undermining the system's fairness.
Haewon Byeon +5 more
semanticscholar +1 more source

