DOI:10.20894/IJWT. Periodicity: Bi Annual. Impact Factor: SJIF:4.78 & GIF:0.428 Submission:Any Time Publisher: IIR Groups Language: English Review Process: Double Blinded
C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Storage Security in Cloud Computing", Proc. IEEE INFOCOM ,2010 View Artical
C. Wang, K. Ren, W. Lou, and J. Li, "Towards Publicly Auditable Secure Cloud Data Storage Services", IEEE Network Magazine ,Vol.24 ,2010 View Artical
F. Sebe, J. Domingo-Ferrer, A. Mart??nez-Balleste, Y. Deswarte, and J.-J.Quisquater, "Efficient Remote Data Possession Checking in Critical Information Infrastructures", IEEE Trans. Knowledge and Data Eng. ,Vol.20 ,2008 View Artical
A. Juels and B. S. K. Jr, "Pors: proofs of irretrievability for large files", in ACMConference on Computer and Communications Se ,2007 View Artical
J. Kincaid, "MediaMax/TheLinkup Closes Its Doors ,2008 View Artical
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing", IEEE Trans. Parallel and Distributed Systems ,Vol.22 ,2011 View Artical
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores", Proc. 14th ACM Conf. Computer and Comm. Security ,2007 View Artical
C. Wang, K. Ren, W. Lou, and J. Li, "Towards Publicly Auditable Secure Cloud Data Storage Services", IEEE Network Magazine ,Vol.24 ,Issue 4 ,2010 View Artical
F. Sebe, J. Domingo-Ferrer, A. Mart??nez-Balleste, Y. Deswarte, and J.-J.Quisquater, "Efficient Remote Data Possession Checking in Critical Information Infrastructures", IEEE Trans. Knowledge and Data Eng. ,Vol.1 ,Issue 1 ,2008 View Artical
A. Juels and B. S. K. Jr, "Pors: proofs of irretrievability for large files", in ACMConference on Computer and Communications Se ,Vol. ,2007 View Artical
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing", IEEE Trans. Parallel and Distributed Systems ,Vol.22 ,Issue 5 ,2011 View Artical
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores", Proc. 14th ACM Conf. Computer and Comm. Security ,Vol. ,Issue ,2007 View Artical
C. Wang, K. Ren, W. Lou, and J. Li, "Towards Publicly Auditable Secure Cloud Data Storage Services", IEEE Network Magazine ,Vol.24 ,Issue 4 ,2010 View Artical
F. Sebe, J. Domingo-Ferrer, A. Mart??nez-Balleste, Y. Deswarte, and J.-J.Quisquater, "Efficient Remote Data Possession Checking in Critical Information Infrastructures", IEEE Trans. Knowledge and Data Eng. ,Vol.20 ,Issue 8 ,2008 View Artical
A. Juels and B. S. K. Jr, "Pors: proofs of irretrievability for large files", in ACMConference on Computer and Communications Se ,Vol. ,Issue ,2007 View Artical
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores", Proc. 14th ACM Conf. Computer and Comm. Security ,Vol. ,2007 View Artical