Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Security and Communication Networks
/
2018
/
Article
/
Tab 5
/
Research Article
An Effective Integrity Verification Scheme of Cloud Data Based on BLS Signature
Table 5
Computation comparison.
Our scheme
Wang-[
8
]
Worku-[
9
]
Server computation overhead
Auditor computation overhead
Setup phase
overhead