您当前的位置:
首页 >
文章列表页 >
Provable data possession scheme based on public verification and private verification
Papers | 更新时间:2024-06-05
    • Provable data possession scheme based on public verification and private verification

    • Journal on Communications   Vol. 40, Issue 3, Pages: 48-59(2019)
    • DOI:10.11959/j.issn.1000-436x.2019053    

      CLC: TP309
    • Online First:2019-03

      Published:25 March 2019

    移动端阅览

  • Junfeng TIAN, Mengjia CHAI, Liuling QI. Provable data possession scheme based on public verification and private verification[J]. Journal on Communications, 2019, 40(3): 48-59. DOI: 10.11959/j.issn.1000-436x.2019053.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

1582

下载量

1

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Query recovery attacks against conjunctive keyword searchable encryption
Attribute-based bilateral access control scheme for cloud storage
Blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid
Volume-hiding encrypted multi-map scheme based on hierarchical structure
Data popularity-based encrypted deduplication scheme without third-party servers

Related Author

DU Ruiying
SHEN Bei
HE Kun
ZHAO Chenbin
WANG Beining
CHEN Jing
LI Qi
FAN Haoyuan

Related Institution

School of Cyber Science and Engineering, Wuhan University
Key Laboratory of Cryptography of Zhejiang Province, Hangzhou Normal University
School of Computer Science, Nanjing University of Posts and Telecommunications
The School of Computer Science and Technology, Xidian University
Tongda College of Nanjing University of Posts and Telecommunications
0