|
Volumn 308 CCIS, Issue PART 2, 2012, Pages 422-428
|
Cryptanalysis of Wang's auditing protocol for data storage security in cloud computing
|
Author keywords
Cloud Computing; public auditing; secure data storage
|
Indexed keywords
COMPUTATIONAL RESOURCES;
DATA STORAGE;
HIGH QUALITY SERVICE;
MESSAGE ATTACK;
PUBLIC AUDITING;
SECURE DATA STORAGE;
SECURITY FLAWS;
CLOUD COMPUTING;
DATA STORAGE EQUIPMENT;
NETWORK SECURITY;
MANAGEMENT;
|
EID: 84867487685
PISSN: 18650929
EISSN: None
Source Type: Book Series
DOI: 10.1007/978-3-642-34041-3_59 Document Type: Conference Paper |
Times cited : (25)
|
References (11)
|