Journal articles on the topic 'DNA-based secure data storage'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'DNA-based secure data storage.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
P., Poonguzhali, Prajyot Dhanokar, M. K. Chaithanya, and Mahesh U. Patil. "Secure Storage of Data on Android Based Devices." International Journal of Engineering and Technology 8, no. 3 (March 2016): 177–82. http://dx.doi.org/10.7763/ijet.2016.v6.880.
Full textP., Poonguzhali, Prajyot Dhanokar, M. K. Chaithanya, and Mahesh U. Patil. "Secure Storage of Data on Android Based Devices." International Journal of Engineering and Technology 8, no. 3 (March 2016): 177–82. http://dx.doi.org/10.7763/ijet.2016.v8.880.
Full textChen, Kaikai, Jinbo Zhu, Filip Bošković, and Ulrich F. Keyser. "Nanopore-Based DNA Hard Drives for Rewritable and Secure Data Storage." Nano Letters 20, no. 5 (March 30, 2020): 3754–60. http://dx.doi.org/10.1021/acs.nanolett.0c00755.
Full textManimekalai, R., and M. Chandra Kumar Peter. "Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 252–54. http://dx.doi.org/10.31142/ijtsrd13014.
Full textS, Rajasekaran, Kalifulla Y, Murugesan S, Ezhilvendan M, and Gunasekaran J. "Authentication Based Cloud Storage and Secure Data Forwarding." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 1 (February 1, 2013): 106–10. http://dx.doi.org/10.24297/ijct.v4i1b.3068.
Full textGo, Woong, and Jin Kwak. "Dual server-based secure data-storage system for cloud storage." International Journal of Engineering Systems Modelling and Simulation 6, no. 1/2 (2014): 86. http://dx.doi.org/10.1504/ijesms.2014.058428.
Full textChenchen Han, Chenchen Han, Gwang-Jun Kim Chenchen Han, Osama Alfarraj Gwang-Jun Kim, Amr Tolba Osama Alfarraj, and Yongjun Ren Amr Tolba. "ZT-BDS: A Secure Blockchain-based Zero-trust Data Storage Scheme in 6G Edge IoT." 網際網路技術學刊 23, no. 2 (March 2022): 289–95. http://dx.doi.org/10.53106/160792642022032302009.
Full textYuliang Shi, Kun Zhang, and Qingzhong Li. "Meta-data Driven Data Chunk Based Secure Data Storage for SaaS." International Journal of Digital Content Technology and its Applications 5, no. 1 (January 31, 2011): 173–85. http://dx.doi.org/10.4156/jdcta.vol5.issue1.18.
Full textHsiao-Ying Lin and Wen-Guey Tzeng. "A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding." IEEE Transactions on Parallel and Distributed Systems 23, no. 6 (June 2012): 995–1003. http://dx.doi.org/10.1109/tpds.2011.252.
Full textJaved, Muhammad Umar, Mubariz Rehman, Nadeem Javaid, Abdulaziz Aldegheishem, Nabil Alrajeh, and Muhammad Tahir. "Blockchain-Based Secure Data Storage for Distributed Vehicular Networks." Applied Sciences 10, no. 6 (March 16, 2020): 2011. http://dx.doi.org/10.3390/app10062011.
Full textRamadevi, M., and D. Bulla Rao. "A Novel identity based secure distributed data storage scheme." IOSR Journal of Computer Engineering 16, no. 6 (2014): 53–59. http://dx.doi.org/10.9790/0661-16645359.
Full textGrosges, Thomas, and Dominique Barchiesi. "Toward nanoworld-based secure encryption for enduring data storage." Optics Letters 35, no. 14 (July 9, 2010): 2421. http://dx.doi.org/10.1364/ol.35.002421.
Full textDwivedi, Sandhya, and Juhi Kanungo. "TSDT: TPA Based Secure Data Transmission of Cloud Data Storage System." IJARCCE 6, no. 6 (June 30, 2017): 499–507. http://dx.doi.org/10.17148/ijarcce.2017.6688.
Full textFeng, Tao, Xusheng Wang, Chunyan Liu, and Junli Fang. "Secure Data Collaborative Computing Scheme Based on Blockchain." Security and Communication Networks 2021 (January 13, 2021): 1–9. http://dx.doi.org/10.1155/2021/6630291.
Full textBabu, K. R. Remesh, and K. P. Madhu. "Intelligent Secure Storage Mechanism for Big Data." Webology 18, Special Issue 01 (April 29, 2021): 246–61. http://dx.doi.org/10.14704/web/v18si01/web18057.
Full textShaharkar, Bhushan B., and Darshan P. Pandit. "ML Based Authentication Scheme for Data Storage in Cloud Based IoT." International Journal of Engineering and Advanced Technology 11, no. 6 (August 30, 2022): 123–27. http://dx.doi.org/10.35940/ijeat.f3767.0811622.
Full textSeethaRamulu, Banoth, H. Balaji, and Bashetty Suman. "Attribute based Access Control Scheme in Cloud Storage System." International Journal of Engineering & Technology 7, no. 4.6 (September 25, 2018): 33. http://dx.doi.org/10.14419/ijet.v7i4.6.20228.
Full textSaikeerthana, R., and A. Umamakeswari. "Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption." Indian Journal of Science and Technology 8, S9 (May 10, 2015): 318. http://dx.doi.org/10.17485/ijst/2015/v8is9/65600.
Full textLi, Hongzhi, Dezhi Han, and Mingdong Tang. "Logisticschain: A Blockchain-Based Secure Storage Scheme for Logistics Data." Mobile Information Systems 2021 (February 3, 2021): 1–15. http://dx.doi.org/10.1155/2021/8840399.
Full textWang, Jin, Wencheng Chen, Lei Wang, R. Simon Sherratt, Osama Alfarraj, and Amr Tolba. "Data Secure Storage Mechanism of Sensor Networks Based on Blockchain." Computers, Materials & Continua 65, no. 3 (2020): 2365–84. http://dx.doi.org/10.32604/cmc.2020.011567.
Full textYu, Yong, Yannan Li, Bo Yang, Willy Susilo, Guomin Yang, and Jian Bai. "Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage." IEEE Transactions on Emerging Topics in Computing 8, no. 2 (April 1, 2020): 377–90. http://dx.doi.org/10.1109/tetc.2017.2759329.
Full textCui, Hui, Robert H. Deng, and Yingjiu Li. "Attribute-based cloud storage with secure provenance over encrypted data." Future Generation Computer Systems 79 (February 2018): 461–72. http://dx.doi.org/10.1016/j.future.2017.10.010.
Full textLin, Siyu, and Hao Wu. "Bloom Filter-Based Secure Data Forwarding in Large-Scale Cyber-Physical Systems." Mathematical Problems in Engineering 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/150512.
Full textZhou, Bao, Junsan Zhao, Guoping Chen, and Ying Yin. "Research on Secure Storage Technology of Spatiotemporal Big Data Based on Blockchain." Applied Sciences 13, no. 13 (July 6, 2023): 7911. http://dx.doi.org/10.3390/app13137911.
Full textMathur, Neha, Shweta Sinha, Rajesh Kumar Tyagi, and Nishtha Jatana. "Analysis of Secure Data Sharing Techniques Using Blockchain." Fusion: Practice and Applications 10, no. 2 (2023): 42–54. http://dx.doi.org/10.54216/fpa.100204.
Full textR, Rushyanthan. "Blockchain Based Secured Document Storage for Cloud." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (August 31, 2022): 1979–86. http://dx.doi.org/10.22214/ijraset.2022.46528.
Full textInbaraj, X. Alphonse, and A. Seshagiri Rao. "Modified Secure Data Deduplication Computing in Cloud based Environment." Circulation in Computer Science 2, no. 7 (August 20, 2017): 14–19. http://dx.doi.org/10.22632/ccs-2017-252-42.
Full textShrivastava, Gaurav, and Sachin Patel. "Secure Storage and Data Sharing Scheme Using Private Blockchain-Based HDFS Data Storage for Cloud Computing." International Journal of Computer Networks and Applications 10, no. 1 (January 1, 2023): 28. http://dx.doi.org/10.22247/ijcna/2023/218509.
Full textGeetha, G., G. Surekha, P. Aditya Sharma, and E. Uma Shankari. "Provide a secured automatic program algorithm for DNA sequence storage arrangement in cloud." International Journal of Engineering & Technology 7, no. 2.20 (April 18, 2018): 10. http://dx.doi.org/10.14419/ijet.v7i2.20.11733.
Full textThangavel, M., and P. Varalakshmi. "Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud." Cluster Computing 21, no. 2 (November 22, 2017): 1411–37. http://dx.doi.org/10.1007/s10586-017-1368-4.
Full textJohnson, Reena, and M. V. Bramhe. "A Technique for Secure Data Deduplication in Cloud Storage." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 12 (December 30, 2017): 91. http://dx.doi.org/10.23956/ijarcsse.v7i12.513.
Full textLi, Jingyi. "Research on dynamic and secure storage of financial data based on cloud platform." Web Intelligence 19, no. 4 (January 20, 2022): 263–74. http://dx.doi.org/10.3233/web-210472.
Full textRamesh, Dharavath, Rahul Mishra, and Damodar Reddy Edla. "Secure Data Storage in Cloud: An e-Stream Cipher-Based Secure and Dynamic Updation Policy." Arabian Journal for Science and Engineering 42, no. 2 (December 2, 2016): 873–83. http://dx.doi.org/10.1007/s13369-016-2357-2.
Full textPhale, Jayesh, Ass Prof Soni R. Ragho, Rushikesh Kale, Priya Yelakar, and Priyanka Sul. "Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 3749–53. http://dx.doi.org/10.22214/ijraset.2023.52497.
Full textPassricha, Vishal, Ashish Chopra, and Shubhanshi Singhal. "Secure Deduplication Scheme for Cloud Encrypted Data." International Journal of Advanced Pervasive and Ubiquitous Computing 11, no. 2 (April 2019): 27–40. http://dx.doi.org/10.4018/ijapuc.2019040103.
Full textZhang, Zhuyun, and Yanjun Geng. "A Secure Cloud Storage Algorithm for University Financial Data Based on the Blockchain Technology." Mobile Information Systems 2022 (August 31, 2022): 1–9. http://dx.doi.org/10.1155/2022/5030738.
Full textSong, Heqing, Jifei Li, and Haoteng Li. "A Cloud Secure Storage Mechanism Based on Data Dispersion and Encryption." IEEE Access 9 (2021): 63745–51. http://dx.doi.org/10.1109/access.2021.3075340.
Full textRen, Yongjun, Yan Leng, Yaping Cheng, and Jin Wang. "Secure data storage based on blockchain and coding in edge computing." Mathematical Biosciences and Engineering 16, no. 4 (2019): 1874–92. http://dx.doi.org/10.3934/mbe.2019091.
Full textCui, Hui, Robert H. Deng, Yingjiu Li, and Guowei Wu. "Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud." IEEE Transactions on Big Data 5, no. 3 (September 1, 2019): 330–42. http://dx.doi.org/10.1109/tbdata.2017.2656120.
Full textNagasri, Y., P. Deepika, and P. Sandhya Priya. "Efficient and Secure Data Forwarding for Erasure code Based Cloud Storage." International Journal of Computer Trends and Technology 35, no. 2 (May 25, 2016): 76–78. http://dx.doi.org/10.14445/22312803/ijctt-v35p113.
Full textKale, Rushikesh, Assi Prof Soni R. Ragho, Jayesh Phale, Priya Yelakar, and Priyanka Sul. "Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud." International Journal for Research in Applied Science and Engineering Technology 11, no. 3 (March 31, 2023): 1385–89. http://dx.doi.org/10.22214/ijraset.2023.49675.
Full textMule, Balakrishna Reddy, Rishi Raj Kumar, Gude Srinivasulu, Gaddam Ranga Uday Sudheer, and Dr K. Bala. "Secure Data Storage Using Erasure-Coding in Cloud Environment." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 872–75. http://dx.doi.org/10.22214/ijraset.2023.51636.
Full textSivasankari, S., V. Lavanya, G. Saranya, and S. Lavanya. "Attributes Based Storage System for Secure De-Duplication of Encrypt Data in Cloud." Journal of Computational and Theoretical Nanoscience 17, no. 4 (April 1, 2020): 1937–42. http://dx.doi.org/10.1166/jctn.2020.8470.
Full textReddy, P. Radha Krishna, S. Sivaramaiah, and U. Sesadri. "Secure Data Forwarding in Cloud Storage System by using UMIB Proxy." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 8 (August 30, 2013): 1905–12. http://dx.doi.org/10.24297/ijct.v10i8.1472.
Full textPajany M. and Zayaraz G. "A Robust Lightweight Data Security Model for Cloud Data Access and Storage." International Journal of Information Technology and Web Engineering 16, no. 3 (July 2021): 39–53. http://dx.doi.org/10.4018/ijitwe.2021070103.
Full textAljumah, Abdullah, Tariq Ahamed Ahanger, and Imdad Ullah. "Heterogeneous Blockchain-Based Secure Framework for UAV Data." Mathematics 11, no. 6 (March 10, 2023): 1348. http://dx.doi.org/10.3390/math11061348.
Full textMasood, Raziqa, and Q. P. Rana. "Public Auditing for Secure Cloud Storage based on DHT." Journal of University of Shanghai for Science and Technology 23, no. 11 (November 6, 2021): 86–98. http://dx.doi.org/10.51201/jusst/21/10853.
Full textA.R.Gadekar, Mr, Dr M.V.Sarode, and Dr V.M.Thakare. "Cloud Based Secure Storage for Online Examination System." International Journal of Engineering & Technology 7, no. 3.8 (July 7, 2018): 74. http://dx.doi.org/10.14419/ijet.v7i3.8.15224.
Full textGousteris, Solonas, Yoannis C. Stamatiou, Constantinos Halkiopoulos, Hera Antonopoulou, and Nikos Kostopoulos. "Secure Distributed Cloud Storage based on the Blockchain Technology and Smart Contracts." Emerging Science Journal 7, no. 2 (February 14, 2023): 469–79. http://dx.doi.org/10.28991/esj-2023-07-02-012.
Full textMarwan, Samiha Abdelrahman Mohammed, Ahmed Shawish, and Khaled Nagaty. "Utilizing DNA Strands for Secured Data-Hiding with High Capacity." International Journal of Interactive Mobile Technologies (iJIM) 11, no. 2 (April 11, 2017): 88. http://dx.doi.org/10.3991/ijim.v11i2.6565.
Full text