The following publications are possibly variants of this publication:
- Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud StorageYongjun Ren, Jian Shen, Jin Wang, Liming Fang. iih-msp 2014: 795-798 [doi]
- Delegable Provable Data Possession for Remote Data in the CloudsShiuan-Tzuo Shen, Wen-Guey Tzeng. icics 2011: 93-111 [doi]
- Proxy Provable Data Possession in Public CloudsHuaqun Wang. tsc, 6(4):551-559, 2013. [doi]
- Non-Repudiable Provable Data Possession in Cloud StorageHongyuan Wang, Liehuang Zhu, Yijia Lilong, Chang Xu. iacr, 2015:432, 2015. [doi]
- Provable data transfer from provable data possession and deletion in cloud storageLiang Xue, Jianbing Ni, Yannan Li, Jian Shen. csi, 54:46-54, 2017. [doi]
- Proxy Provable Data Possession with General Access Structure in Public CloudsHuaqun Wang, Debiao He. cisc 2016: 283-300 [doi]
- Provable Data Possession Supporting Secure Data Transfer for Cloud StorageYong Yu, Jianbing Ni, Wei Wu, Yilei Wang. bwcca 2015: 38-42 [doi]