Publication | Closed Access
Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
94
Citations
44
References
2018
Year
AuditingEngineeringInformation SecurityCryptographic ProtectionCloud ComputingSecurityInformation ForensicsData PrivacyCloud CryptographyCloud Computing SecurityComputer ScienceStorage SecuritySecurity AuditData ManagementData SecurityCryptography
| Year | Citations | |
|---|---|---|
Page 1
Page 1