Provable data possession at untrusted stores, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.598-609, 2007. ,
DOI : 10.1145/1315245.1315318
Guest Editorial: Emerging Trends in Research for Insider Threat Detection, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), pp.1-6, 2014. ,
An Efficient Public Batch Auditing Protocol for Data Security in Multi-cloud Storage, 2013 8th ChinaGrid Annual Conference, pp.51-56, 2013. ,
DOI : 10.1109/ChinaGrid.2013.13
Invalidating Policies using Structural Information, 2013 IEEE Security and Privacy Workshops, pp.59-79, 2014. ,
DOI : 10.1109/SPW.2013.36
Generating Test Data for Insider Threat Detectors, Journal of Wireless Mobile Networks, Ubiquitous Computing , and Dependable Applications (JoWUA), pp.80-94, 2014. ,
Compact proofs of retrievability, ASIACRYPT 2008, pp.90-107, 2008. ,
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing, ESORICS 2009, pp.355-370, 2009. ,
DOI : 10.1007/3-540-45682-1_30
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing, 2010 Proceedings IEEE INFOCOM, pp.525-533, 2010. ,
DOI : 10.1109/INFCOM.2010.5462173
Privacy-Preserving Public Auditing for Secure Cloud Storage, IEEE Transactions on Computers, vol.62, issue.2, pp.362-375, 2013. ,
DOI : 10.1109/TC.2011.245
An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing, IEEE Transactions on Parallel and Distributed Systems, vol.24, issue.9, pp.1717-1726, 2013. ,
DOI : 10.1109/TPDS.2012.278
Dynamic audit services for integrity verification of outsourced storages in clouds, Proceedings of the 2011 ACM Symposium on Applied Computing, SAC '11, pp.1550-1557, 2011. ,
DOI : 10.1145/1982185.1982514
Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage, IEEE Transactions on Parallel and Distributed Systems, vol.23, issue.12, pp.2231-2244, 2012. ,
DOI : 10.1109/TPDS.2012.66