Efficient Remote Data Possession Checking in Critical Information Infrastructures | Publicación