Secure and efficient parallel hash function construction and its application on cloud audit
Rapid development of cloud computing has created enormous security challenges on
authenticity, integrity, availability and reliability of outsourced data. Cloud audit is an …
authenticity, integrity, availability and reliability of outsourced data. Cloud audit is an …
Secure and efficient parallel hash function construction and its application on cloud audit.
Y Yang, F Chen, Z Sun, S Wang, J Li… - Soft Computing-A …, 2019 - search.ebscohost.com
Rapid development of cloud computing has created enormous security challenges on
authenticity, integrity, availability and reliability of outsourced data. Cloud audit is an …
authenticity, integrity, availability and reliability of outsourced data. Cloud audit is an …
Secure and efficient parallel hash function construction and its application on cloud audit
Y Yang, F Chen, Z Sun, S Wang, J Li, J Chen… - Soft …, 2019 - search.proquest.com
Rapid development of cloud computing has created enormous security challenges on
authenticity, integrity, availability and reliability of outsourced data. Cloud audit is an …
authenticity, integrity, availability and reliability of outsourced data. Cloud audit is an …
Secure and efficient parallel hash function construction and its application on cloud audit
Y Yang, F Chen, Z Sun, S Wang, J Li, J Chen, Z Ming - 2019 - dl.acm.org
Rapid development of cloud computing has created enormous security challenges on
authenticity, integrity, availability and reliability of outsourced data. Cloud audit is an …
authenticity, integrity, availability and reliability of outsourced data. Cloud audit is an …