The following publications are possibly variants of this publication:
- Publicly verifiable outsourced data migration scheme supporting efficient integrity checkingChangsong Yang, Feng Zhao 0002, Xiaoling Tao, Yong Wang. jnca, 192:103184, 2021. [doi]
- A new public remote integrity checking scheme with user and data privacyYiteng Feng, Guomin Yang, Joseph K. Liu. ijact, 3(3):196-209, 2017. [doi]
- A New Public Remote Integrity Checking Scheme with User PrivacyYiteng Feng, Yi Mu, Guomin Yang, Joseph K. Liu. acisp 2015: 377-394 [doi]
- Public Data Integrity Checking for Cloud Storage with Privacy PreservingHao Yan, Zheng Zhang, Shuo Qiu, Haizhong Qian, Zhiguo Bian, Yanan Liu. icct 2019: 1408-1412 [doi]
- ID-Based Public Auditing Protocol for Cloud Data Integrity Checking with Privacy-Preserving and Effective Aggregation VerificationBaoyuan Kang, Lin Si, Hong Jiang, Chunqing Li, Mingming Xie. scn, 2018, 2018. [doi]
- Searchable Public Key Encryption Scheme with Data Integrity CheckingJun Yang, Shujuan Li. bwcca 2017: 363-370 [doi]
- Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systemsQuanyu Zhao, Siyi Chen, Zheli Liu, Thar Baker, Yuan Zhang. ipm, 57(6):102355, 2020. [doi]