Publication | Closed Access
A method for achieving provable data integrity in cloud computing
46
Citations
12
References
2016
Year
EngineeringData IntegrityInformation SecurityVerificationCloud ComputingFormal MethodsData PrivacyInformation ForensicsCloud CryptographyCloud Computing SecurityComputer ScienceStorage SecurityData ManagementFormal VerificationData SecurityCryptographyIntegrity Verification
| Year | Citations | |
|---|---|---|
Page 1
Page 1