Abstract
In recent decades, a number of protocols for Remote data integrity checking (RDIC) have been proposed. Identity (ID) based RDIC protocols are construc......
小提示:本篇文献需要登录阅读全文,点击跳转登录