共 50 条
- [21] Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor Network [J]. INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 419 - 440
- [23] Data Integrity Verification in Network Slicing using Oracles and Smart Contracts [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2022), 2022, : 476 - 481
- [24] Convolutional Neural Network Based Medical Images Integrity Verification [J]. TENTH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2019, 2019, 11071
- [25] Integrity verification for XML data [J]. WCECS 2007: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, 2007, : 633 - 638
- [26] Data Integrity Attacks and Defenses for Intel Lab Sensor Network [J]. 2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2015, : 721 - 726
- [27] Provenance based data integrity checking and verification in cloud environments [J]. PLOS ONE, 2017, 12 (05):
- [28] An Efficient Public Auditing Method with Periodic Verification for Data Integrity in Cloud [J]. EMERGING RESEARCH IN ELECTRONICS, COMPUTER SCIENCE AND TECHNOLOGY, ICERECT 2018, 2019, 545 : 285 - 291
- [29] Outsourced data integrity verification based on blockchain in untrusted environment [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2020, 23 (04): : 2215 - 2238
- [30] Outsourced data integrity verification based on blockchain in untrusted environment [J]. World Wide Web, 2020, 23 : 2215 - 2238