Collusion-Attack-Defensive Data Location Verification Protocols in Cloud Computing

DU Si-jun, XU Shang-shu, LIU Jun-nan, ZHANG Jun-wei, MA Jian-feng

Acta Electronica Sinica ›› 2017, Vol. 45 ›› Issue (6) : 1321-1326.

PDF(1012 KB)
CIE Homepage  |  Join CIE  |  Login CIE  |  中文 
PDF(1012 KB)
Acta Electronica Sinica ›› 2017, Vol. 45 ›› Issue (6) : 1321-1326. DOI: 10.3969/j.issn.0372-2112.2017.06.006

Collusion-Attack-Defensive Data Location Verification Protocols in Cloud Computing

    {{javascript:window.custom_author_en_index=0;}}
  • {{article.zuoZhe_EN}}
Author information +

HeighLight

{{article.keyPoints_en}}

Abstract

{{article.zhaiyao_en}}

Key words

QR code of this article

Cite this article

Download Citations
{{article.zuoZheEn_L}}. {{article.title_en}}[J]. {{journal.qiKanMingCheng_EN}}, 2017, 45(6): 1321-1326 https://doi.org/10.3969/j.issn.0372-2112.2017.06.006

References

References

{{article.reference}}

Funding

RIGHTS & PERMISSIONS

{{article.copyrightStatement_en}}
{{article.copyrightLicense_en}}
PDF(1012 KB)

Accesses

Citation

Detail

Sections
Recommended

/