您当前的位置:
首页 >
文章列表页 >
Key-exposure resilient integrity auditing scheme with encrypted data deduplication
Papers | 更新时间:2024-06-05
    • Key-exposure resilient integrity auditing scheme with encrypted data deduplication

    • Journal on Communications   Vol. 40, Issue 4, Pages: 95-106(2019)
    • DOI:10.11959/j.issn.1000-436x.2019076    

      CLC: TN309
    • Online First:2019-04

      Published:25 April 2019

    移动端阅览

  • Xiangsong ZHANG, Chen LI, Zhenhua LIU. Key-exposure resilient integrity auditing scheme with encrypted data deduplication[J]. Journal on Communications, 2019, 40(4): 95-106. DOI: 10.11959/j.issn.1000-436x.2019076.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

1684

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Query recovery attacks against conjunctive keyword searchable encryption
Attribute-based bilateral access control scheme for cloud storage
Blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid
Volume-hiding encrypted multi-map scheme based on hierarchical structure
Data popularity-based encrypted deduplication scheme without third-party servers

Related Author

DU Ruiying
SHEN Bei
HE Kun
ZHAO Chenbin
WANG Beining
CHEN Jing
LI Qi
FAN Haoyuan

Related Institution

School of Cyber Science and Engineering, Wuhan University
Key Laboratory of Cryptography of Zhejiang Province, Hangzhou Normal University
School of Computer Science, Nanjing University of Posts and Telecommunications
The School of Computer Science and Technology, Xidian University
Tongda College of Nanjing University of Posts and Telecommunications
0