A Novel Proof of Data Possession Scheme based on Set-Homomorphic Operations

Summary

This is a publication. If there is no link to the publication on this page, you can try the pre-formated search via the search engines listed on this page.

Authors: Nesrine Kaaniche, Maryline Laurent, Sébastien Canard

Journal title: Second Workshop on Security in Clouds (SEC2)

Journal publisher: SEC2 2016

Published year: 2016

DOI identifier: 10.5281/zenodo.58911