Abstract | ||
---|---|---|
Sensitive data stored in laptops or other mobile devices can easily be lost, stolen, misplaced or corrupted, the remote backup storage technique is used to address these issues; however, the backup server could not be fully trusted, the data should be encrypted in advance. Although the key is more easily protected due to the smaller size compared with the backup data, it is still impossible for or... |
Year | DOI | Venue |
---|---|---|
2017 | 10.1049/iet-ifs.2016.0103 | IET Information Security |
Keywords | Field | DocType |
authorisation,storage management | Authentication,Computer science,Computer network,Smart card,Data Authentication Algorithm,Encryption,Authentication protocol,Password,Multi-factor authentication,Backup | Journal |
Volume | Issue | ISSN |
11 | 5 | 1751-8709 |
Citations | PageRank | References |
7 | 0.43 | 0 |
Authors | ||
6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Yining Liu | 1 | 32 | 5.36 |
Qi Zhong | 2 | 10 | 0.81 |
Liang Chang | 3 | 7 | 1.45 |
Zhe Xia | 4 | 19 | 8.17 |
Debiao He | 5 | 2856 | 147.71 |
Chi Cheng | 6 | 7 | 1.11 |