-
1
Privacy cloud storage scheme based on fog computing
Published 2019-03-01Subjects: “…cloud storage…”
Get full text
Article -
2
Secure resource metering and accounting with hash chain in cloud storage
Published 2013-08-01Subjects: “…cloud storage…”
Get full text
Article -
3
AONT-and-NTRU-based rekeying scheme for encrypted deduplication
Published 2021-10-01Subjects: “…cloud storage…”
Get full text
Article -
4
-
5
Differential data update scheme on network-coding-based cloud storage system
Published 2017-03-01Subjects: Get full text
Article -
6
Modeling and maintaining the reliability of data replica service in cloud storage systems
Published 2014-10-01Subjects: “…cloud storage…”
Get full text
Article -
7
Dual verifiable cloud storage scheme based on blockchain
Published 2021-12-01Subjects: Get full text
Article -
8
Ustor: cloud storage system based on regenerating codes
Published 2014-04-01Subjects: “…cloud storage…”
Get full text
Article -
9
Multi-replica provable data possession scheme supporting data dynamic updating
Published 2014-11-01Subjects: “…cloud storage…”
Get full text
Article -
10
Lightweight integrity verification scheme for cloud based group data
Published 2016-10-01Subjects: “…cloud storage…”
Get full text
Article -
11
Dynamic multi-keyword searchable encryption scheme
Published 2023-04-01Subjects: Get full text
Article -
12
A New Solution of Privacy-Preserving Public Auditing Scheme for Cloud Storage Security
Published 2012-09-01Subjects: Get full text
Article -
13
Blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid
Published 2024-01-01Subjects: Get full text
Article -
14
Priority differentiated multicast flow scheduling method in Ceph cloud storage network
Published 2020-11-01Subjects: Get full text
Article -
15
Analysis and improvement on identity-based cloud data integrity verification scheme
Published 2018-11-01Subjects: “…cloud storage…”
Get full text
Article -
16
Identity-based cloud storage integrity checking from lattices
Published 2019-04-01Subjects: Get full text
Article -
17
Research on ciphertext search for the cloud environment
Published 2013-07-01Subjects: “…cloud storage…”
Get full text
Article -
18
New method for file deduplication in cloud storage
Published 2017-03-01Subjects: Get full text
Article -
19
Multi-authority attribute-based encryption access control model for cloud storage
Published 2015-06-01Subjects: “…cloud storage…”
Get full text
Article -
20
Code security of mobile backup modules on the Android platform
Published 2017-01-01Subjects: “…mobile cloud storage…”
Get full text
Article