Text
Data security in cloud storage (wireless networks)
Table of Contents
Chapter 1. Introduction
Chapter 2. Basic Techniques for Data Security
Chapter 3. Cloud Storage Reliability
Chapter 4. Secure Deduplication
Chapter 5. Secure Keyword Search
Chapter 6. Secure Data Provenance
Chapter 7. Secure Data Time-Stamping
Chapter 8. Summary and Future Research D
No other version available