메뉴 건너뛰기




Volumn 308 CCIS, Issue PART 2, 2012, Pages 422-428

Cryptanalysis of Wang's auditing protocol for data storage security in cloud computing

Author keywords

Cloud Computing; public auditing; secure data storage

Indexed keywords

COMPUTATIONAL RESOURCES; DATA STORAGE; HIGH QUALITY SERVICE; MESSAGE ATTACK; PUBLIC AUDITING; SECURE DATA STORAGE; SECURITY FLAWS;

EID: 84867487685     PISSN: 18650929     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-34041-3_59     Document Type: Conference Paper
Times cited : (25)

References (11)
  • 4
    • 77953318836 scopus 로고    scopus 로고
    • Wilson, S.: Appengine outage (2008), http://www.cio-weblog.com/50226711/ appengine-outage.php
    • (2008) Appengine Outage
    • Wilson, S.1
  • 7
    • 58349083629 scopus 로고    scopus 로고
    • Privacy-preserving audit and extraction of digital contents
    • Technical report 2008/196, ePrint Archive
    • Shah, M., Swaminathan, R., Baker, M.: Privacy-preserving audit and extraction of digital contents. Technical report 2008/196, Cryptology ePrint Archive (2008)
    • (2008) Cryptology
    • Shah, M.1    Swaminathan, R.2    Baker, M.3
  • 11
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data Storage Security in cloud computing
    • Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data Storage Security in cloud computing. In: InfoCom 2010, USA (2010)
    • InfoCom 2010, USA (2010)
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.