Results 261 to 270 of about 24,134 (292)
Some of the next articles are maybe not open access.

Data Possession Provability on Semi-trusted Cloud Storage

2014
In cloud storage applications, users cannot trust storage service provider as before. They need reliable methods to verify the possession of their data as well as replicas on such semi-trusted platform. In this paper, PPoDT scheme is carefully designed based on Data Tag to prove data possession with a Challenge-Response model.
Wei Fu, Bo Yan, Xiaoping Wu
openaire   +1 more source

An Identity-Set-Based Provable Data Possession Scheme

2019
Provable Data Possession (PDP) scheme is a cryptographic protocol that allows the users to check the availability and integrity of outsourced data on cloud storage servers (CSS) which are not completely trusted. Most of the PDP schemes are publicly verifiable, while private verification is necessary in some applications to prevent the disclosure of any
Changlu Lin   +3 more
openaire   +1 more source

Cancer statistics, 2023

Ca-A Cancer Journal for Clinicians, 2023
Rebecca L Siegel   +2 more
exaly  

Cancer statistics, 2022

Ca-A Cancer Journal for Clinicians, 2022
Rebecca L Siegel   +2 more
exaly  

An overview of real‐world data sources for oncology and considerations for research

Ca-A Cancer Journal for Clinicians, 2022
Lynne Penberthy   +2 more
exaly  

Cancer Statistics, 2021

Ca-A Cancer Journal for Clinicians, 2021
Rebecca L Siegel, Kimberly D Miller
exaly  

Innovations in research and clinical care using patient‐generated health data

Ca-A Cancer Journal for Clinicians, 2020
H S L Jim   +2 more
exaly  

Keyword Searchable Provable Data Possession in Generative AI Enabled Intelligent Transportation Systems

IEEE transactions on intelligent transportation systems (Print)
Yuxin Cui   +5 more
semanticscholar   +1 more source

Cancer statistics, 2020

Ca-A Cancer Journal for Clinicians, 2020
Rebecca L Siegel, Kimberly D Miller
exaly  

FM-DPDP: Fine-grained Multicopy Dynamic Provable Data Possession with flexible storage

Journal of Information Security and Applications
Caiyuan Tang   +6 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy