Author of the publication

Enabling dynamic proof of retrievability in regenerating-coding-based cloud storage.

, , , , and . ICC Workshops, page 712-717. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Integrity Verification of Secure Outsourced kNN Computation in Cloud Environments., , , , and . Trustcom/BigDataSE/ISPA, page 236-243. IEEE, (2016)Testing Anti-denial of Service Attacks Based on Mobile Agent., , and . CIS, page 598-602. IEEE Computer Society, (2011)Efficient k-Nearest Neighbor Classification Over Semantically Secure Hybrid Encrypted Cloud Database., , , , and . IEEE Access, (2018)WindTalker: An Efficient and Robust Protocol of Cloud Covert Channel Based on Memory Deduplication., , , , and . BDCloud, page 68-75. IEEE, (2015)PPolyNets: Achieving High Prediction Accuracy and Efficiency With Parametric Polynomial Activations., , , , and . IEEE Access, (2018)Almost automorphic synchronization of quaternion-valued high-order Hopfield neural networks with time-varying and distributed delays., , and . IMA J. Math. Control & Information, 36 (3): 983-1013 (2019)Efficient and secure data forwarding for erasure-code-based cloud storage., , , , and . ICC Workshops, page 1820-1826. IEEE, (2015)Enabling dynamic proof of retrievability in regenerating-coding-based cloud storage., , , , and . ICC Workshops, page 712-717. IEEE, (2014)Reliable and confidential cloud storage with efficient data forwarding functionality., , , , and . IET Communications, 10 (6): 661-668 (2016)Secure Collaborative Outsourced k-Nearest Neighbor Classification with Multiple Owners in Cloud Environment., , , , , and . Inscrypt, volume 10143 of Lecture Notes in Computer Science, page 451-471. Springer, (2016)