Zeitschriftenartikel zum Thema „Information storage and retrieval systems - security“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Information storage and retrieval systems - security" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Arunarani, Ar, und D. Manjula Perkinian. „Intelligent Techniques for Providing Effective Security to Cloud Databases“. International Journal of Intelligent Information Technologies 14, Nr. 1 (Januar 2018): 1–16. http://dx.doi.org/10.4018/ijiit.2018010101.
Der volle Inhalt der QuelleKovalcik, Justin, und Mike Villalobos. „Automated Storage & Retrieval System“. Information Technology and Libraries 38, Nr. 4 (16.12.2019): 114–24. http://dx.doi.org/10.6017/ital.v38i4.11273.
Der volle Inhalt der QuelleBidve, Vijaykumar, Kiran Kakakde, Pakiriswamy Sarasu, Shailesh Kediya, Pradip Tamkhade und Suprakash Sudarsanan Nair. „Patient data management using blockchain technology“. Indonesian Journal of Electrical Engineering and Computer Science 32, Nr. 3 (01.12.2023): 1746. http://dx.doi.org/10.11591/ijeecs.v32.i3.pp1746-1754.
Der volle Inhalt der QuelleShojaei, Parisasadat, Elena Vlahu-Gjorgievska und Yang-Wai Chow. „Security and Privacy of Technologies in Health Information Systems: A Systematic Literature Review“. Computers 13, Nr. 2 (31.01.2024): 41. http://dx.doi.org/10.3390/computers13020041.
Der volle Inhalt der QuelleXie, Run, Chanlian He, Dongqing Xie, Chongzhi Gao und Xiaojun Zhang. „A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage“. Security and Communication Networks 2018 (06.06.2018): 1–7. http://dx.doi.org/10.1155/2018/7254305.
Der volle Inhalt der QuellePing, Yuan, Wei Song, Zhili Zhang, Weiping Wang und Baocang Wang. „A Multi-Keyword Searchable Encryption Scheme Based on Probability Trapdoor over Encryption Cloud Data“. Information 11, Nr. 8 (12.08.2020): 394. http://dx.doi.org/10.3390/info11080394.
Der volle Inhalt der QuelleFolasole, Adetayo, Oluwasegun Solomon Adegboye, Oluwaseun Isaiah Ekuewa und Patience Emanre Eshua. „Security, Privacy Challenges and Available Countermeasures in Electronic Health Record Systems: A Review“. European Journal of Electrical Engineering and Computer Science 7, Nr. 6 (13.11.2023): 27–33. http://dx.doi.org/10.24018/ejece.2023.7.6.561.
Der volle Inhalt der QuelleZhang, Qiuyu, Minrui Fu, Yibo Huang und Zhenyu Zhao. „Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage“. Security and Communication Networks 2022 (30.03.2022): 1–14. http://dx.doi.org/10.1155/2022/9045259.
Der volle Inhalt der QuelleLi, Weijing, Zicheng Zhou, Wen Fan und Juan Gao. „Design of Data Sharing Platform Based on Blockchain and IPFS Technology“. Wireless Communications and Mobile Computing 2022 (13.07.2022): 1–7. http://dx.doi.org/10.1155/2022/3937725.
Der volle Inhalt der QuelleTaipalus, Toni, Hilkka Grahn, Hannu Turtiainen und Andrei Costin. „Utilizing Vector Database Management Systems in Cyber Security“. European Conference on Cyber Warfare and Security 23, Nr. 1 (21.06.2024): 560–65. http://dx.doi.org/10.34190/eccws.23.1.2220.
Der volle Inhalt der QuelleGatkal, Suyog, Vinayak Dhage, Dhanashree Kalekar und Sanket Ghadge. „Survey on Medical Data Storage Systems“. International Journal of Soft Computing and Engineering 11, Nr. 1 (30.09.2021): 44–48. http://dx.doi.org/10.35940/ijsce.a3528.0911121.
Der volle Inhalt der QuelleHamid, Yasir, Rameez Yousuf und Atif Chowhan. „Security in Health Information Management Records through Blockchain Technology“. Journal of Information Security and Cybercrimes Research 6, Nr. 1 (30.06.2023): 24–39. http://dx.doi.org/10.26735/qbij3667.
Der volle Inhalt der QuelleRashid, Mustafa Noori, Leith Hamid Abed und Waleed Kareem Awad. „Financial information security using hybrid encryption technique on multi-cloud architecture“. Bulletin of Electrical Engineering and Informatics 11, Nr. 6 (01.12.2022): 3450–61. http://dx.doi.org/10.11591/eei.v11i6.3967.
Der volle Inhalt der QuelleGupta, Daya Sagar, und G. P. Biswas. „Secure Computation on Cloud Storage“. Journal of Cases on Information Technology 17, Nr. 3 (Juli 2015): 22–29. http://dx.doi.org/10.4018/jcit.2015070103.
Der volle Inhalt der QuelleZhou, Wenbo. „MSCFS-RP: A Colored-Petri-Net-Based Analysis Model for Master–Slave Cloud File Systems with Replication Pipelining“. Electronics 13, Nr. 14 (19.07.2024): 2852. http://dx.doi.org/10.3390/electronics13142852.
Der volle Inhalt der QuelleAlsudani, Mustafa Qahtan, Hassan Falah Fakhruldeen, Heba Abdul-Jaleel Al-Asady und Feryal Ibrahim Jabbar. „Storage and encryption file authentication for cloud-based data retrieval“. Bulletin of Electrical Engineering and Informatics 11, Nr. 2 (01.04.2022): 1110–16. http://dx.doi.org/10.11591/eei.v11i2.3344.
Der volle Inhalt der QuelleShyam, Shyam, Pankaj Kumar, Rajeev Shrivastava, Satyabrata Jena, Tushar Kumar Pandey und Ankita Nigam. „Innovations in Cyber Security Algorithms for Databases Enhancing Data Retrieval and Management“. Journal of Cybersecurity and Information Management 13, Nr. 2 (2024): 191–98. http://dx.doi.org/10.54216/jcim.130215.
Der volle Inhalt der QuelleAl-Mayali, Yahya Mahdi Hadi, und Zahraa Yahya Mahdi Al-Mayali. „Digitization, and Coding, with Optimizing, of Iraqi Personnel Home Addresses forward, minimizing Storage Space, and Processing time“. BIO Web of Conferences 97 (2024): 00028. http://dx.doi.org/10.1051/bioconf/20249700028.
Der volle Inhalt der QuelleMishari Abdullah, AL Ajery,, Thamari, Abdullah Ali, Al Malki, Faisal Hamed, Khormi, Ahmed Abdu und Al Farshan, Salem Mohammed. „THE EVOLUTION OF MEDICAL INFORMATION MANAGEMENT: PAST, PRESENT, AND FUTURE PERSPECTIVES“. EPH - International Journal of Medical and Health Science 8, Nr. 2 (11.06.2022): 22–30. http://dx.doi.org/10.53555/eijmhs.v8i2.181.
Der volle Inhalt der QuelleN. Mhawi, Doaa, Haider W. Oleiwi und Heba L. Al-Taie. „Generating Encrypted Document Index Structure Using Tree Browser“. Journal of Techniques 5, Nr. 2 (26.06.2023): 114–22. http://dx.doi.org/10.51173/jt.v5i2.948.
Der volle Inhalt der QuelleDing, Yong, Hui Xu, Yujue Wang, Fang Yuan und Hai Liang. „Secure Multi-Keyword Search and Access Control over Electronic Health Records in Wireless Body Area Networks“. Security and Communication Networks 2021 (29.09.2021): 1–11. http://dx.doi.org/10.1155/2021/9520941.
Der volle Inhalt der QuelleMaosa, Herbert, Karim Ouazzane und Viktor Sowinski-Mydlarz. „Real-Time Cyber Analytics Data Collection Framework“. International Journal of Information Security and Privacy 16, Nr. 1 (01.01.2022): 1–10. http://dx.doi.org/10.4018/ijisp.311465.
Der volle Inhalt der QuelleSantiañez, Reymon M., und Benedict M. Sollano. „Development and Evaluation of Local Area Network Based Archiving System“. American Journal of Agricultural Science, Engineering and Technology 5, Nr. 2 (29.11.2021): 286–96. http://dx.doi.org/10.54536/ajaset.v5i2.107.
Der volle Inhalt der QuelleBudati, Anil Kumar, Sridhar Reddy Vulapula, Syed Bilal Hussian Shah, Anas Al-Tirawi und Anil Carie. „Secure Multi-Level Privacy-Protection Scheme for Securing Private Data over 5G-Enabled Hybrid Cloud IoT Networks“. Electronics 12, Nr. 7 (30.03.2023): 1638. http://dx.doi.org/10.3390/electronics12071638.
Der volle Inhalt der QuelleLazim Lafta, Ali, und Ayad I. Abdulsada. „SMPP-CBIR: shorted and mixed aggregated image features for privacy-preserving content-based image retrieval“. Bulletin of Electrical Engineering and Informatics 11, Nr. 5 (01.10.2022): 2930–37. http://dx.doi.org/10.11591/eei.v11i5.4323.
Der volle Inhalt der QuelleDu, Haorui, Jianhua Chen, Fei Lin, Cong Peng und Debiao He. „A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing“. Security and Communication Networks 2022 (15.10.2022): 1–15. http://dx.doi.org/10.1155/2022/2309834.
Der volle Inhalt der QuelleAbida Khanam. „"Ensuring Security in Electronic Health Records: Implementing and Validating a Blockchain and IPFS Framework"“. Journal of Electrical Systems 20, Nr. 7s (04.05.2024): 2356–68. http://dx.doi.org/10.52783/jes.3972.
Der volle Inhalt der QuelleKumar Barai, Dilip, G. Sridevi, Syed Umar und MSR Prasad. „Information Base Security Threats and Challenges' in Information Forensic: A Survey“. Indonesian Journal of Electrical Engineering and Computer Science 1, Nr. 2 (01.02.2016): 406. http://dx.doi.org/10.11591/ijeecs.v1.i2.pp406-410.
Der volle Inhalt der QuelleMei, Zhuolin, Jing Yu, Jinzhou Huang, Bin Wu, Zhiqiang Zhao, Caicai Zhang, Jiaoli Shi, Xiancheng Wang und Zongda Wu. „Secure Cloud Storage and Retrieval of Personal Health Data From Smart Wearable Devices With Privacy-Preserving Techniques“. International Journal of Web Services Research 20, Nr. 1 (05.10.2023): 1–18. http://dx.doi.org/10.4018/ijwsr.331388.
Der volle Inhalt der QuelleD. Rajalakshmi, Et al. „HealthBlock: A Blockchain-IoT Fusion for Secure Healthcare Data Exchange“. International Journal on Recent and Innovation Trends in Computing and Communication 11, Nr. 9 (05.11.2023): 2018–23. http://dx.doi.org/10.17762/ijritcc.v11i9.9199.
Der volle Inhalt der QuelleJain, Paras, Sunita Dwivedi, Adel R. Alharbi, R. Sureshbabu, Devesh Pratap Singh, Sajjad Shaukat Jamal und Daniel Krah. „Blockchain-Enabled Smart Surveillance System with Artificial Intelligence“. Wireless Communications and Mobile Computing 2022 (06.05.2022): 1–9. http://dx.doi.org/10.1155/2022/2792639.
Der volle Inhalt der QuelleThigale, Satyam R. „Multiple Keyword Search in Cloud Data“. INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, Nr. 04 (09.04.2024): 1–5. http://dx.doi.org/10.55041/ijsrem30422.
Der volle Inhalt der QuelleFATIEIEVA, Anastasiia. „Information systems in the enterprise's management“. Economics. Finances. Law, Nr. 6/1 (26.06.2020): 11–15. http://dx.doi.org/10.37634/efp.2020.6(1).2.
Der volle Inhalt der QuelleAl-Mukhtar, Wijdan Noaman Marzoog. „Enhancing Data Security in Cloud Computing: A Comparative Analysis of Encryption Techniques“. International Journal on Recent and Innovation Trends in Computing and Communication 11, Nr. 11 (30.11.2023): 195–207. http://dx.doi.org/10.17762/ijritcc.v11i11.9306.
Der volle Inhalt der QuelleGouveia Junior, Mário. „O pensamento de baumaniano e os paradigmas de mediação da informação“. RDBCI: Revista Digital de Biblioteconomia e Ciência da Informação 13, Nr. 1 (30.01.2015): 156. http://dx.doi.org/10.20396/rdbci.v13i1.1586.
Der volle Inhalt der QuelleJayathissa, Prabath, und Roshan Hewapathrana. „HAPI-FHIR Server Implementation to Enhancing Interoperability among Primary Care Health Information Systems in Sri Lanka: Review of the Technical Use Case“. European Modern Studies Journal 7, Nr. 6 (01.02.2024): 225–41. http://dx.doi.org/10.59573/emsj.7(6).2023.23.
Der volle Inhalt der QuelleYe, Xubo, und Mababa Jonilo. „Unleashing the Power of Big Data: Designing a Robust Business Intelligence Framework for E-commerce Data Analytics“. Journal of Information Systems Engineering and Management 8, Nr. 3 (29.11.2023): 22638. http://dx.doi.org/10.55267/iadt.07.13946.
Der volle Inhalt der QuelleKumar, Sarvesh, Mohammed Abdul Wajeed, Rajashekhar Kunabeva, Nripendra Dwivedi, Prateek Singhal, Sajjad Shaukat Jamal und Reynah Akwafo. „Novel Method for Safeguarding Personal Health Record in Cloud Connection Using Deep Learning Models“. Computational Intelligence and Neuroscience 2022 (19.03.2022): 1–14. http://dx.doi.org/10.1155/2022/3564436.
Der volle Inhalt der QuelleWang, Miye, Sheyu Li, Tao Zheng, Nan Li, Qingke Shi, Xuejun Zhuo, Renxin Ding und Yong Huang. „Big Data Health Care Platform With Multisource Heterogeneous Data Integration and Massive High-Dimensional Data Governance for Large Hospitals: Design, Development, and Application“. JMIR Medical Informatics 10, Nr. 4 (13.04.2022): e36481. http://dx.doi.org/10.2196/36481.
Der volle Inhalt der QuelleReddy, Vonteru Srikanth, und Kumar Debasis. „Statistical Review of Health Monitoring Models for Real-Time Hospital Scenarios“. International Journal on Recent and Innovation Trends in Computing and Communication 11, Nr. 7s (13.07.2023): 465–81. http://dx.doi.org/10.17762/ijritcc.v11i7s.7025.
Der volle Inhalt der QuelleRakhmawati, Rina, Elya Riska Dwi Wahyuni, Walda Khoiriyah, Titi Susanti und Dwi Noviana Purnamasari. „Open Journal System (OJS) As An Office Automation Model“. Diplomatika: Jurnal Kearsipan Terapan 5, Nr. 1 (11.01.2023): 1. http://dx.doi.org/10.22146/diplomatika.68200.
Der volle Inhalt der QuelleZhao, Meng, und Yong Ding. „Dual-Server Identity-Based Encryption with Authorized Equality Test for IoT Data in Clouds“. Security and Communication Networks 2022 (11.10.2022): 1–12. http://dx.doi.org/10.1155/2022/4905763.
Der volle Inhalt der QuelleChen, Zhenwei, Axin Wu, Yifei Li, Qixuan Xing und Shengling Geng. „Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing“. Security and Communication Networks 2021 (20.01.2021): 1–11. http://dx.doi.org/10.1155/2021/6619689.
Der volle Inhalt der QuelleShinkar, Sonali V., und Dolly Thankachan. „SCMBQA: Design of a Customised SCM-Aware Sidechaining Model for QoS Enhancement under Attack Scenarios“. International Journal on Recent and Innovation Trends in Computing and Communication 10, Nr. 1s (10.12.2022): 200–212. http://dx.doi.org/10.17762/ijritcc.v10i1s.5824.
Der volle Inhalt der QuelleBommala, Harikrishna, Sireesha Vikkurty, K. Ramesh Babu und Bhargavi Peddi Reddy. „Security Issues in Service Model of Fog Computing Environment“. International Journal on Recent and Innovation Trends in Computing and Communication 11, Nr. 9s (31.08.2023): 88–92. http://dx.doi.org/10.17762/ijritcc.v11i9s.7400.
Der volle Inhalt der QuelleSumahasan, S., und D. Rajyalakshmi. „An Optimized Node Level Lightweight Security Algorithm for Cloud Assisted-IoT“. International Journal on Recent and Innovation Trends in Computing and Communication 11, Nr. 9s (31.08.2023): 78–87. http://dx.doi.org/10.17762/ijritcc.v11i9s.7399.
Der volle Inhalt der QuelleAnokhina, T. Y., und T. N. Zaitseva. „AUDIOVISUAL RECORDS AS A SOCIOCULTURAL PHENOMENON: PROBLEMS OF CREATION, STORAGE AND DEVELOPMENT PROSPECTS“. KAZAN SOCIALLY-HUMANITARIAN BULLETIN 11, Nr. 2 (Februar 2020): 4–8. http://dx.doi.org/10.24153/2079-5912-2020-11-2-4-8.
Der volle Inhalt der QuelleFu, Siyi, und Kaza Mojtahe. „Harr-NMF Feature Extraction for Multilevel Educational Technology Teaching Big Data System“. Security and Communication Networks 2022 (18.05.2022): 1–12. http://dx.doi.org/10.1155/2022/3178763.
Der volle Inhalt der QuelleZhang, Ping, Jinbo Li und Zhumu Fu. „Public Key Encryption with Equality Test in a Cloud Environment“. Information 13, Nr. 6 (24.05.2022): 265. http://dx.doi.org/10.3390/info13060265.
Der volle Inhalt der QuelleTseng, Yi-Fan, Zi-Yuan Liu, Jen-Chieh Hsu und Raylin Tso. „Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function“. Security and Communication Networks 2021 (12.02.2021): 1–12. http://dx.doi.org/10.1155/2021/6678194.
Der volle Inhalt der Quelle