2017 IEEE International Conference on Intelligent Techniques in Control, Optimization and Signal Processing (INCOS) 2017
DOI: 10.1109/itcosp.2017.8303135
View full text |Buy / Rent full text
|
Sign up to set email alerts
|
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…The method is MAC based and is capable to resist replay and Man-in-the-Middle (MIMA) attacks. Remote Data Possession (RDP) method is also used by Hariharasitaraman and Balakannan (2018) to maintain integrity in Clouds. The authors used the Fractal tree to organize data in files, which in turn consists of blocks of data.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The method is MAC based and is capable to resist replay and Man-in-the-Middle (MIMA) attacks. Remote Data Possession (RDP) method is also used by Hariharasitaraman and Balakannan (2018) to maintain integrity in Clouds. The authors used the Fractal tree to organize data in files, which in turn consists of blocks of data.…”
Section: Literature Reviewmentioning
confidence: 99%