Research Article
Adjacency-Hash-Table Based Public Auditing for Data Integrity in Mobile Cloud Computing
Table 1
Function comparison of auditing protocols.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Note: “✓” means “support”; “×” means “not support”; “” means “no demand”; and “⊙” means “not mentioned”. |