Author of the publication

Efficient method to verify the integrity of data with supporting dynamic data in cloud computing.

, , , and . SCIENCE CHINA Information Sciences, 61 (11): 119101:1-119101:3 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating interfaces with children., , , , and . Personal and Ubiquitous Computing, 17 (8): 1663-1666 (2013)A novel (n, t, n) secret image sharing scheme without a trusted third party., , and . Multimedia Tools Appl., 72 (3): 2195-2209 (2014)Replication attack detection with monitor nodes in clustered wireless sensor networks., , , and . IPCCC, page 1-8. IEEE Computer Society, (2015)General Threshold Signature Based on the Chinese Remainder Theorem., and . IIH-MSP, page 244-247. IEEE Computer Society, (2011)A hierarchical threshold secret image sharing., , and . Pattern Recognition Letters, 33 (1): 83-91 (2012)Modeling and analysis of redundancy in remote monitoring and control systems via petri nets., and . ICINCO, page 37-44. INSTICC Press, (2005)Capacity-and-Energy Efficient Resource Allocation for Emergency Communications., , , , and . VTC Spring, page 1-5. IEEE, (2015)DEvis: an R package for aggregation and visualization of differential expression data., , , , , , , and . BMC Bioinformatics, 20 (1): 110:1-110:7 (2019)Frequency Regulation and Coordinated Control for Complex Wind Power Systems., and . Complexity, (2019)A novel proactive secret image sharing scheme based on LISS., , , , and . Multimedia Tools Appl., 77 (15): 19569-19590 (2018)