Artículos de revistas sobre el tema "CLOUD OF SECRECY"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "CLOUD OF SECRECY".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Gosavi, Mr Abhijeet, Mr Sakib Shaikh, Mr Adnan Sayyed, Mr Somesh Sapa, Mr Ayan Shaikh y Prof A. A. Pund. "Enabling Encrypted Cloud Emails with Data Encryption using Advanced Encryption Techniques". International Journal for Research in Applied Science and Engineering Technology 11, n.º 6 (30 de junio de 2023): 864–69. http://dx.doi.org/10.22214/ijraset.2023.53709.
Texto completoAnjaneyulu, GSGN, Yogendra Singh Sisodiya y Kumar Saurav. "Novel Composite Encryption for Secrecy in Cloud Computing". Research Journal of Pharmacy and Technology 9, n.º 9 (2016): 1501. http://dx.doi.org/10.5958/0974-360x.2016.00292.4.
Texto completoRajkumar, N. y E. Kannan. "Attribute-Based Collusion Resistance in Group-Based Cloud Data Sharing using LKH Model". Journal of Circuits, Systems and Computers 29, n.º 02 (9 de mayo de 2019): 2030001. http://dx.doi.org/10.1142/s0218126620300019.
Texto completoK, Sudha y Dr Umarani C. "Security Framework for Cloud Information under Transparency of a Key". International Journal for Research in Applied Science and Engineering Technology 10, n.º 4 (30 de abril de 2022): 1429–36. http://dx.doi.org/10.22214/ijraset.2022.41550.
Texto completoPark, Junyoung y Eui-Nam Huh. "eCLASS: Edge-Cloud-Log Assuring-Secrecy Scheme for Digital Forensics". Symmetry 11, n.º 10 (22 de septiembre de 2019): 1192. http://dx.doi.org/10.3390/sym11101192.
Texto completoNagaraju, Dr Sabout, S. K. V. Jayakumar y C. Swetha Priya. "Efficient Multi-linear Key Pairing Cryptosystem for Reliable Cloud-based Service Provisioning". Revista Gestão Inovação e Tecnologias 11, n.º 4 (13 de agosto de 2021): 4440–55. http://dx.doi.org/10.47059/revistageintec.v11i4.2471.
Texto completoKhan, Yunus y Sunita Verma. "An Intelligent Blockchain and Software-Defined Networking-Based Evidence Collection Architecture for Cloud Environment". Scientific Programming 2021 (29 de septiembre de 2021): 1–19. http://dx.doi.org/10.1155/2021/7294206.
Texto completoAgarkhed, Jayashree y R. Ashalatha. "Data Privacy and Security in Cloud Environment Using Cryptography Approach". Asian Journal of Computer Science and Technology 7, n.º 1 (5 de mayo de 2018): 50–54. http://dx.doi.org/10.51983/ajcst-2018.7.1.1830.
Texto completoQin, Bo, Huaqun Wang, Qianhong Wu, Jianwei Liu y Josep Domingo-Ferrer. "Simultaneous authentication and secrecy in identity-based data upload to cloud". Cluster Computing 16, n.º 4 (23 de abril de 2013): 845–59. http://dx.doi.org/10.1007/s10586-013-0258-7.
Texto completoSrilakshmi, K. y P. Bhargavi. "Cloud Computing Security Using Cryptographic Algorithms". Asian Journal of Computer Science and Technology 8, S3 (5 de junio de 2019): 76–80. http://dx.doi.org/10.51983/ajcst-2019.8.s3.2082.
Texto completoJanjua, Kanwal, Munam Ali Shah, Ahmad Almogren, Hasan Ali Khattak, Carsten Maple y Ikram Ud Din. "Proactive Forensics in IoT: Privacy-Aware Log-Preservation Architecture in Fog-Enabled-Cloud Using Holochain and Containerization Technologies". Electronics 9, n.º 7 (19 de julio de 2020): 1172. http://dx.doi.org/10.3390/electronics9071172.
Texto completoSahar Altaf, Muhammad Wajahat Ali, Muhammad Waqar Khan, Sumaira Yousuf Khan,. "A REVIEW OF THE SECURITY ISSUES IN CLOUD COMPUTING AND ITS REMEDIAL ACTION". INFORMATION TECHNOLOGY IN INDUSTRY 9, n.º 1 (2 de marzo de 2021): 444–55. http://dx.doi.org/10.17762/itii.v9i1.150.
Texto completoIzang, A. A., Y. A. Mensah, O. J. Omotosho y C. P. Obioma. "Overview of Cloud Computing and Recent Addendum". Journal of Communications Technology, Electronics and Computer Science 5 (10 de mayo de 2016): 26. http://dx.doi.org/10.22385/jctecs.v5i0.93.
Texto completoKanashevskiy, V. A. "Legal problems of using cloud services of foreign providers by Russian banks". Lex Russica, n.º 3 (5 de abril de 2019): 108–15. http://dx.doi.org/10.17803/1729-5920.2019.148.3.108-115.
Texto completoChiou, Shin-Yan. "A Secure Distributed Cloud Storage System Achieving Data Secrecy and Load Balance". International Journal of Security and Its Applications 11, n.º 10 (31 de octubre de 2017): 1–14. http://dx.doi.org/10.14257/ijsia.2017.11.10.01.
Texto completoKim, Byung Wook. "Secrecy Dimming Capacity in Multi-LED PAM-Based Visible Light Communications". Wireless Communications and Mobile Computing 2017 (2017): 1–6. http://dx.doi.org/10.1155/2017/4094096.
Texto completoNOMURA, Kenta, Masami MOHRI, Yoshiaki SHIRAISHI y Masakatu MORII. "Attribute Revocable Multi-Authority Attribute-Based Encryption with Forward Secrecy for Cloud Storage". IEICE Transactions on Information and Systems E100.D, n.º 10 (2017): 2420–31. http://dx.doi.org/10.1587/transinf.2016ofp0004.
Texto completoA., Mohan y vamshikrishna P. "Accounting and Privacy Preserving of Data Owner in Cloud Storage". International Journal of Innovative Technology and Exploring Engineering 10, n.º 6 (30 de abril de 2021): 14–17. http://dx.doi.org/10.35940/ijitee.f8715.0410621.
Texto completoChennam, Krishna Keerthi y M. Akka Lakshmi. "Cloud Security in Crypt Database Server Using Fine Grained Access Control". International Journal of Electrical and Computer Engineering (IJECE) 6, n.º 3 (1 de junio de 2016): 915. http://dx.doi.org/10.11591/ijece.v6i3.8925.
Texto completoChennam, Krishna Keerthi y M. Akka Lakshmi. "Cloud Security in Crypt Database Server Using Fine Grained Access Control". International Journal of Electrical and Computer Engineering (IJECE) 6, n.º 3 (1 de junio de 2016): 915. http://dx.doi.org/10.11591/ijece.v6i3.pp915-924.
Texto completoMuhammad Arslan Tariq, Muhammad Arslan Tariq. "Anomaly based Intrusion Detection System". International Journal for Electronic Crime Investigation 3, n.º 3 (6 de septiembre de 2019): 7. http://dx.doi.org/10.54692/ijeci.2020.030341.
Texto completoMuhammad Arslan Tariq, Muhammad Arslan Tariq. "Anomaly based Intrusion Detection System". International Journal for Electronic Crime Investigation 3, n.º 3 (6 de septiembre de 2019): 7. http://dx.doi.org/10.54692/ijeci.2020.030336.
Texto completoMuhammad Arslan Tariq, Muhammad Arslan Tariq. "Anomaly based Intrusion Detection System". International Journal for Electronic Crime Investigation 3, n.º 3 (6 de septiembre de 2019): 7. http://dx.doi.org/10.54692/ijeci.2019.030341.
Texto completoMuhammad Arslan Tariq, Muhammad Arslan Tariq. "Anomaly based Intrusion Detection System". International Journal for Electronic Crime Investigation 3, n.º 3 (6 de septiembre de 2019): 7. http://dx.doi.org/10.54692/ijeci.2019.030336.
Texto completoShi, Yanfeng y Shuo Qiu. "Ciphertext-Policy Attribute-Based Encryption with Outsourced Set Intersection in Multimedia Cloud Computing". Electronics 10, n.º 21 (3 de noviembre de 2021): 2685. http://dx.doi.org/10.3390/electronics10212685.
Texto completoN. Sarode, Snehal y Geetha R. Chillarge. "Efficient and Secure Multi-Keyword Ranked Search and Group Data Sharing for Encrypted Cloud Data". Journal of Scientific Research 66, n.º 02 (2022): 68–78. http://dx.doi.org/10.37398/jsr.2022.660210.
Texto completoKwofie, A. y A. A. Barik. "Cloud Security: Using Advance Encryption Standard Algorithm to Secure Cloud Data at Client Side and Taking Measures to Protect its Secrecy". International Journal of Advance Research and Innovation 8, n.º 3 (2020): 11–14. http://dx.doi.org/10.51976/ijari.832003.
Texto completoKwao Dawson, John, Frimpong Twum, James Benjamin Hayfron Acquah y Yaw Marfo Missah. "PRISMA Archetype-Based Systematic Literature Review of Security Algorithms in the Cloud". Security and Communication Networks 2023 (3 de julio de 2023): 1–17. http://dx.doi.org/10.1155/2023/9210803.
Texto completoKumariK, Anitha, Sudha Sadasivam G y Madhumitha R. "Solution to Security and Secrecy in Cloud Environment using PAKE Protocol - A Bibliographic Survey". International Journal of Computer Applications 96, n.º 2 (18 de junio de 2014): 26–36. http://dx.doi.org/10.5120/16767-6334.
Texto completoWang, Chenyu, Ke Ding, Bin Li, Yiming Zhao, Guoai Xu, Yanhui Guo y Ping Wang. "An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment". Wireless Communications and Mobile Computing 2018 (1 de octubre de 2018): 1–13. http://dx.doi.org/10.1155/2018/3048697.
Texto completoAl-Sayyed, Rizik M. H., Wadi’ A. Hijawi, Anwar M. Bashiti, Ibrahim AlJarah, Nadim Obeid y Omar Y. A. Al-Adwan. "An Investigation of Microsoft Azure and Amazon Web Services from Users’ Perspectives". International Journal of Emerging Technologies in Learning (iJET) 14, n.º 10 (30 de mayo de 2019): 217. http://dx.doi.org/10.3991/ijet.v14i10.9902.
Texto completoWang, Feifei, Guosheng Xu, Guoai Xu, Yuejie Wang y Junhao Peng. "A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure". Wireless Communications and Mobile Computing 2020 (18 de febrero de 2020): 1–15. http://dx.doi.org/10.1155/2020/3805058.
Texto completoD, Ramesh y Rama B. "Secure Privacy Implications for Clients and End-users through Key Assortment Crypto Techniques Implicated Algorithm". International Journal of Electrical and Computer Engineering (IJECE) 8, n.º 6 (1 de diciembre de 2018): 5443. http://dx.doi.org/10.11591/ijece.v8i6.pp5443-5448.
Texto completoAbouljam, Sana Mohammed y Tulika . "Cloud based secured privacy preserving protocol for vehicular DTNS". International Journal of Engineering & Technology 7, n.º 1.1 (21 de diciembre de 2017): 199. http://dx.doi.org/10.14419/ijet.v7i1.1.9455.
Texto completoRavichandran, S. y J. Sathiamoorthy. "An Innovative Performance of Refuge using Stowage Main Servers in Cloud Computing Equipment". Asian Journal of Computer Science and Technology 10, n.º 1 (5 de mayo de 2021): 13–17. http://dx.doi.org/10.51983/ajcst-2021.10.1.2695.
Texto completoLai, Jian-Foo y Swee-Huay Heng. "Secure File Storage On Cloud Using Hybrid Cryptography". Journal of Informatics and Web Engineering 1, n.º 2 (15 de septiembre de 2022): 1–18. http://dx.doi.org/10.33093/jiwe.2022.1.2.1.
Texto completoAlsaedi, Emad y Alaa Kadhim. "A comparative study of combining deep learning and homomorphic encryption techniques". Al-Qadisiyah Journal Of Pure Science 27, n.º 1 (13 de marzo de 2022): 17–33. http://dx.doi.org/10.29350/qjps.2022.27.1.1452.
Texto completoZakria Mahrousa, Mahmoud Rahhal, Nairouz Alzin, Zakria Mahrousa, Mahmoud Rahhal, Nairouz Alzin. "Hybrid Secure Model for Securing Data in The Cloud Computing System by Combining RSA, AES and CP-ABE: نموذج هجين آمن لحماية البيانات في الحوسبة السحابية بدمج RSA وAES وCP-ABE". Journal of engineering sciences and information technology 5, n.º 4 (30 de diciembre de 2021): 80–59. http://dx.doi.org/10.26389/ajsrp.z110521.
Texto completoCutugno, Matteo, Umberto Robustelli y Giovanni Pugliano. "Structure-from-Motion 3D Reconstruction of the Historical Overpass Ponte della Cerra: A Comparison between MicMac® Open Source Software and Metashape®". Drones 6, n.º 9 (6 de septiembre de 2022): 242. http://dx.doi.org/10.3390/drones6090242.
Texto completoYoun, Taek-Young y Hyun Sook Rhee. "Secure Symmetric Keyword Search with Keyword Privacy for Cloud Storage Services". Security and Communication Networks 2021 (30 de noviembre de 2021): 1–8. http://dx.doi.org/10.1155/2021/2291470.
Texto completoSomaru, Navilla y Christa Rautenbach. "Non-criminal dispute resolution in South Africa’s criminal justice system: Proposals for reform". South African Journal of Criminal Justice 33, n.º 3 (2020): 646–69. http://dx.doi.org/10.47348/sacj/v33/i3a7.
Texto completoSastry, J. K. R. y M. Trinath Basu. "Securing multi-tenancy systems through multi DB instances and multiple databases on different physical servers". International Journal of Electrical and Computer Engineering (IJECE) 9, n.º 2 (1 de abril de 2019): 1385. http://dx.doi.org/10.11591/ijece.v9i2.pp1385-1392.
Texto completoHan, Linrui. "Personal Privacy Data Protection in Location Recommendation System". Journal of Physics: Conference Series 2138, n.º 1 (1 de diciembre de 2021): 012026. http://dx.doi.org/10.1088/1742-6596/2138/1/012026.
Texto completoSai Ji, Sai Ji, Yang Yuan Sai Ji, Jian Shen Yang Yuan, Chin-Feng Lai Jian Shen y Bofan Chen Chin-Feng Lai. "An Efficient Three-Party Authentication and Key Agreement Protocol for Privacy-Preserving of IoT Devices in Mobile Edge Computing". 網際網路技術學刊 23, n.º 3 (mayo de 2022): 437–48. http://dx.doi.org/10.53106/160792642022052303002.
Texto completoMeka, Likhita y Srivyshnavi Pagadala. "Providing a Secure Cloud Storage by Using Attribute Based Temporary Key Word Search Scheme". Asian Journal of Computer Science and Technology 8, S3 (5 de junio de 2019): 117–21. http://dx.doi.org/10.51983/ajcst-2019.8.s3.2825.
Texto completoB, Aravind, Harikrishnan S, Santhosh G, Vijay J.E y Saran Suaji T. "An Efficient Privacy - Aware Authentication Framework for Mobile Cloud Computing". International Academic Journal of Innovative Research 10, n.º 1 (20 de abril de 2023): 1–7. http://dx.doi.org/10.9756/iajir/v10i1/iajir1001.
Texto completoMuhammad Umar Munir, Ghulam Abbas Khan y Arslan Ammin. "Generic Framework Related to Database Forensics and Security Countermeasures". Journal of Computing & Biomedical Informatics 1, n.º 01 (15 de septiembre de 2020): 15–30. http://dx.doi.org/10.56979/101/2020/42.
Texto completoMuhammad, Irfan, Hirley Alves, Onel Alcaraz López y Matti Latva-aho. "Secure Rate Control and Statistical QoS Provisioning for Cloud-Based IoT Networks". Security and Communication Networks 2021 (29 de octubre de 2021): 1–19. http://dx.doi.org/10.1155/2021/8650272.
Texto completoAlzuwaini, Mustafa y Ali Yassin. "An Efficient Mechanism to Prevent the Phishing Attacks". Iraqi Journal for Electrical and Electronic Engineering 17, n.º 1 (19 de mayo de 2021): 1–11. http://dx.doi.org/10.37917/ijeee.17.1.15.
Texto completoJamjoom, Mona, Hussein Abulkasim y Safia Abbas. "Lightweight Authenticated Privacy-Preserving Secure Framework for the Internet of Vehicles". Security and Communication Networks 2022 (9 de septiembre de 2022): 1–11. http://dx.doi.org/10.1155/2022/6573060.
Texto completo