Today's article comes from the Journal of Cloud Computing: Advances, Systems and Applications. The authors are Dave et al., from the Birla Institute of Technology and Science, in India. In this paper they showcase a proof-of-ownership scheme that forces users to authenticate their rights to a file in a more comprehensive way.
DOI: 10.1186/s13677-025-00743-y
You must be an active Journal Club member to access this content. If you're already a member, click the blue button to login. If you're not a member yet, click the sign-up button to get started.
Login to My Account
Sign Up