Artículos de revistas sobre el tema "Information storage and retrieval systems - security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Information storage and retrieval systems - security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Arunarani, Ar y D. Manjula Perkinian. "Intelligent Techniques for Providing Effective Security to Cloud Databases". International Journal of Intelligent Information Technologies 14, n.º 1 (enero de 2018): 1–16. http://dx.doi.org/10.4018/ijiit.2018010101.
Texto completoKovalcik, Justin y Mike Villalobos. "Automated Storage & Retrieval System". Information Technology and Libraries 38, n.º 4 (16 de diciembre de 2019): 114–24. http://dx.doi.org/10.6017/ital.v38i4.11273.
Texto completoBidve, Vijaykumar, Kiran Kakakde, Pakiriswamy Sarasu, Shailesh Kediya, Pradip Tamkhade y Suprakash Sudarsanan Nair. "Patient data management using blockchain technology". Indonesian Journal of Electrical Engineering and Computer Science 32, n.º 3 (1 de diciembre de 2023): 1746. http://dx.doi.org/10.11591/ijeecs.v32.i3.pp1746-1754.
Texto completoShojaei, Parisasadat, Elena Vlahu-Gjorgievska y Yang-Wai Chow. "Security and Privacy of Technologies in Health Information Systems: A Systematic Literature Review". Computers 13, n.º 2 (31 de enero de 2024): 41. http://dx.doi.org/10.3390/computers13020041.
Texto completoXie, Run, Chanlian He, Dongqing Xie, Chongzhi Gao y Xiaojun Zhang. "A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage". Security and Communication Networks 2018 (6 de junio de 2018): 1–7. http://dx.doi.org/10.1155/2018/7254305.
Texto completoPing, Yuan, Wei Song, Zhili Zhang, Weiping Wang y Baocang Wang. "A Multi-Keyword Searchable Encryption Scheme Based on Probability Trapdoor over Encryption Cloud Data". Information 11, n.º 8 (12 de agosto de 2020): 394. http://dx.doi.org/10.3390/info11080394.
Texto completoFolasole, Adetayo, Oluwasegun Solomon Adegboye, Oluwaseun Isaiah Ekuewa y Patience Emanre Eshua. "Security, Privacy Challenges and Available Countermeasures in Electronic Health Record Systems: A Review". European Journal of Electrical Engineering and Computer Science 7, n.º 6 (13 de noviembre de 2023): 27–33. http://dx.doi.org/10.24018/ejece.2023.7.6.561.
Texto completoZhang, Qiuyu, Minrui Fu, Yibo Huang y Zhenyu Zhao. "Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage". Security and Communication Networks 2022 (30 de marzo de 2022): 1–14. http://dx.doi.org/10.1155/2022/9045259.
Texto completoLi, Weijing, Zicheng Zhou, Wen Fan y Juan Gao. "Design of Data Sharing Platform Based on Blockchain and IPFS Technology". Wireless Communications and Mobile Computing 2022 (13 de julio de 2022): 1–7. http://dx.doi.org/10.1155/2022/3937725.
Texto completoTaipalus, Toni, Hilkka Grahn, Hannu Turtiainen y Andrei Costin. "Utilizing Vector Database Management Systems in Cyber Security". European Conference on Cyber Warfare and Security 23, n.º 1 (21 de junio de 2024): 560–65. http://dx.doi.org/10.34190/eccws.23.1.2220.
Texto completoGatkal, Suyog, Vinayak Dhage, Dhanashree Kalekar y Sanket Ghadge. "Survey on Medical Data Storage Systems". International Journal of Soft Computing and Engineering 11, n.º 1 (30 de septiembre de 2021): 44–48. http://dx.doi.org/10.35940/ijsce.a3528.0911121.
Texto completoHamid, Yasir, Rameez Yousuf y Atif Chowhan. "Security in Health Information Management Records through Blockchain Technology". Journal of Information Security and Cybercrimes Research 6, n.º 1 (30 de junio de 2023): 24–39. http://dx.doi.org/10.26735/qbij3667.
Texto completoRashid, Mustafa Noori, Leith Hamid Abed y Waleed Kareem Awad. "Financial information security using hybrid encryption technique on multi-cloud architecture". Bulletin of Electrical Engineering and Informatics 11, n.º 6 (1 de diciembre de 2022): 3450–61. http://dx.doi.org/10.11591/eei.v11i6.3967.
Texto completoGupta, Daya Sagar y G. P. Biswas. "Secure Computation on Cloud Storage". Journal of Cases on Information Technology 17, n.º 3 (julio de 2015): 22–29. http://dx.doi.org/10.4018/jcit.2015070103.
Texto completoZhou, Wenbo. "MSCFS-RP: A Colored-Petri-Net-Based Analysis Model for Master–Slave Cloud File Systems with Replication Pipelining". Electronics 13, n.º 14 (19 de julio de 2024): 2852. http://dx.doi.org/10.3390/electronics13142852.
Texto completoAlsudani, Mustafa Qahtan, Hassan Falah Fakhruldeen, Heba Abdul-Jaleel Al-Asady y Feryal Ibrahim Jabbar. "Storage and encryption file authentication for cloud-based data retrieval". Bulletin of Electrical Engineering and Informatics 11, n.º 2 (1 de abril de 2022): 1110–16. http://dx.doi.org/10.11591/eei.v11i2.3344.
Texto completoShyam, Shyam, Pankaj Kumar, Rajeev Shrivastava, Satyabrata Jena, Tushar Kumar Pandey y Ankita Nigam. "Innovations in Cyber Security Algorithms for Databases Enhancing Data Retrieval and Management". Journal of Cybersecurity and Information Management 13, n.º 2 (2024): 191–98. http://dx.doi.org/10.54216/jcim.130215.
Texto completoAl-Mayali, Yahya Mahdi Hadi y Zahraa Yahya Mahdi Al-Mayali. "Digitization, and Coding, with Optimizing, of Iraqi Personnel Home Addresses forward, minimizing Storage Space, and Processing time". BIO Web of Conferences 97 (2024): 00028. http://dx.doi.org/10.1051/bioconf/20249700028.
Texto completoMishari Abdullah, AL Ajery,, Thamari, Abdullah Ali, Al Malki, Faisal Hamed, Khormi, Ahmed Abdu y Al Farshan, Salem Mohammed. "THE EVOLUTION OF MEDICAL INFORMATION MANAGEMENT: PAST, PRESENT, AND FUTURE PERSPECTIVES". EPH - International Journal of Medical and Health Science 8, n.º 2 (11 de junio de 2022): 22–30. http://dx.doi.org/10.53555/eijmhs.v8i2.181.
Texto completoN. Mhawi, Doaa, Haider W. Oleiwi y Heba L. Al-Taie. "Generating Encrypted Document Index Structure Using Tree Browser". Journal of Techniques 5, n.º 2 (26 de junio de 2023): 114–22. http://dx.doi.org/10.51173/jt.v5i2.948.
Texto completoDing, Yong, Hui Xu, Yujue Wang, Fang Yuan y Hai Liang. "Secure Multi-Keyword Search and Access Control over Electronic Health Records in Wireless Body Area Networks". Security and Communication Networks 2021 (29 de septiembre de 2021): 1–11. http://dx.doi.org/10.1155/2021/9520941.
Texto completoMaosa, Herbert, Karim Ouazzane y Viktor Sowinski-Mydlarz. "Real-Time Cyber Analytics Data Collection Framework". International Journal of Information Security and Privacy 16, n.º 1 (1 de enero de 2022): 1–10. http://dx.doi.org/10.4018/ijisp.311465.
Texto completoSantiañez, Reymon M. y Benedict M. Sollano. "Development and Evaluation of Local Area Network Based Archiving System". American Journal of Agricultural Science, Engineering and Technology 5, n.º 2 (29 de noviembre de 2021): 286–96. http://dx.doi.org/10.54536/ajaset.v5i2.107.
Texto completoBudati, Anil Kumar, Sridhar Reddy Vulapula, Syed Bilal Hussian Shah, Anas Al-Tirawi y Anil Carie. "Secure Multi-Level Privacy-Protection Scheme for Securing Private Data over 5G-Enabled Hybrid Cloud IoT Networks". Electronics 12, n.º 7 (30 de marzo de 2023): 1638. http://dx.doi.org/10.3390/electronics12071638.
Texto completoLazim Lafta, Ali y Ayad I. Abdulsada. "SMPP-CBIR: shorted and mixed aggregated image features for privacy-preserving content-based image retrieval". Bulletin of Electrical Engineering and Informatics 11, n.º 5 (1 de octubre de 2022): 2930–37. http://dx.doi.org/10.11591/eei.v11i5.4323.
Texto completoDu, Haorui, Jianhua Chen, Fei Lin, Cong Peng y Debiao He. "A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing". Security and Communication Networks 2022 (15 de octubre de 2022): 1–15. http://dx.doi.org/10.1155/2022/2309834.
Texto completoAbida Khanam. ""Ensuring Security in Electronic Health Records: Implementing and Validating a Blockchain and IPFS Framework"". Journal of Electrical Systems 20, n.º 7s (4 de mayo de 2024): 2356–68. http://dx.doi.org/10.52783/jes.3972.
Texto completoKumar Barai, Dilip, G. Sridevi, Syed Umar y MSR Prasad. "Information Base Security Threats and Challenges' in Information Forensic: A Survey". Indonesian Journal of Electrical Engineering and Computer Science 1, n.º 2 (1 de febrero de 2016): 406. http://dx.doi.org/10.11591/ijeecs.v1.i2.pp406-410.
Texto completoMei, Zhuolin, Jing Yu, Jinzhou Huang, Bin Wu, Zhiqiang Zhao, Caicai Zhang, Jiaoli Shi, Xiancheng Wang y Zongda Wu. "Secure Cloud Storage and Retrieval of Personal Health Data From Smart Wearable Devices With Privacy-Preserving Techniques". International Journal of Web Services Research 20, n.º 1 (5 de octubre de 2023): 1–18. http://dx.doi.org/10.4018/ijwsr.331388.
Texto completoD. Rajalakshmi, Et al. "HealthBlock: A Blockchain-IoT Fusion for Secure Healthcare Data Exchange". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 9 (5 de noviembre de 2023): 2018–23. http://dx.doi.org/10.17762/ijritcc.v11i9.9199.
Texto completoJain, Paras, Sunita Dwivedi, Adel R. Alharbi, R. Sureshbabu, Devesh Pratap Singh, Sajjad Shaukat Jamal y Daniel Krah. "Blockchain-Enabled Smart Surveillance System with Artificial Intelligence". Wireless Communications and Mobile Computing 2022 (6 de mayo de 2022): 1–9. http://dx.doi.org/10.1155/2022/2792639.
Texto completoThigale, Satyam R. "Multiple Keyword Search in Cloud Data". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 04 (9 de abril de 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30422.
Texto completoFATIEIEVA, Anastasiia. "Information systems in the enterprise's management". Economics. Finances. Law, n.º 6/1 (26 de junio de 2020): 11–15. http://dx.doi.org/10.37634/efp.2020.6(1).2.
Texto completoAl-Mukhtar, Wijdan Noaman Marzoog. "Enhancing Data Security in Cloud Computing: A Comparative Analysis of Encryption Techniques". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 11 (30 de noviembre de 2023): 195–207. http://dx.doi.org/10.17762/ijritcc.v11i11.9306.
Texto completoGouveia Junior, Mário. "O pensamento de baumaniano e os paradigmas de mediação da informação". RDBCI: Revista Digital de Biblioteconomia e Ciência da Informação 13, n.º 1 (30 de enero de 2015): 156. http://dx.doi.org/10.20396/rdbci.v13i1.1586.
Texto completoJayathissa, Prabath y Roshan Hewapathrana. "HAPI-FHIR Server Implementation to Enhancing Interoperability among Primary Care Health Information Systems in Sri Lanka: Review of the Technical Use Case". European Modern Studies Journal 7, n.º 6 (1 de febrero de 2024): 225–41. http://dx.doi.org/10.59573/emsj.7(6).2023.23.
Texto completoYe, Xubo y Mababa Jonilo. "Unleashing the Power of Big Data: Designing a Robust Business Intelligence Framework for E-commerce Data Analytics". Journal of Information Systems Engineering and Management 8, n.º 3 (29 de noviembre de 2023): 22638. http://dx.doi.org/10.55267/iadt.07.13946.
Texto completoKumar, Sarvesh, Mohammed Abdul Wajeed, Rajashekhar Kunabeva, Nripendra Dwivedi, Prateek Singhal, Sajjad Shaukat Jamal y Reynah Akwafo. "Novel Method for Safeguarding Personal Health Record in Cloud Connection Using Deep Learning Models". Computational Intelligence and Neuroscience 2022 (19 de marzo de 2022): 1–14. http://dx.doi.org/10.1155/2022/3564436.
Texto completoWang, Miye, Sheyu Li, Tao Zheng, Nan Li, Qingke Shi, Xuejun Zhuo, Renxin Ding y Yong Huang. "Big Data Health Care Platform With Multisource Heterogeneous Data Integration and Massive High-Dimensional Data Governance for Large Hospitals: Design, Development, and Application". JMIR Medical Informatics 10, n.º 4 (13 de abril de 2022): e36481. http://dx.doi.org/10.2196/36481.
Texto completoReddy, Vonteru Srikanth y Kumar Debasis. "Statistical Review of Health Monitoring Models for Real-Time Hospital Scenarios". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 7s (13 de julio de 2023): 465–81. http://dx.doi.org/10.17762/ijritcc.v11i7s.7025.
Texto completoRakhmawati, Rina, Elya Riska Dwi Wahyuni, Walda Khoiriyah, Titi Susanti y Dwi Noviana Purnamasari. "Open Journal System (OJS) As An Office Automation Model". Diplomatika: Jurnal Kearsipan Terapan 5, n.º 1 (11 de enero de 2023): 1. http://dx.doi.org/10.22146/diplomatika.68200.
Texto completoZhao, Meng y Yong Ding. "Dual-Server Identity-Based Encryption with Authorized Equality Test for IoT Data in Clouds". Security and Communication Networks 2022 (11 de octubre de 2022): 1–12. http://dx.doi.org/10.1155/2022/4905763.
Texto completoChen, Zhenwei, Axin Wu, Yifei Li, Qixuan Xing y Shengling Geng. "Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing". Security and Communication Networks 2021 (20 de enero de 2021): 1–11. http://dx.doi.org/10.1155/2021/6619689.
Texto completoShinkar, Sonali V. y Dolly Thankachan. "SCMBQA: Design of a Customised SCM-Aware Sidechaining Model for QoS Enhancement under Attack Scenarios". International Journal on Recent and Innovation Trends in Computing and Communication 10, n.º 1s (10 de diciembre de 2022): 200–212. http://dx.doi.org/10.17762/ijritcc.v10i1s.5824.
Texto completoBommala, Harikrishna, Sireesha Vikkurty, K. Ramesh Babu y Bhargavi Peddi Reddy. "Security Issues in Service Model of Fog Computing Environment". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 9s (31 de agosto de 2023): 88–92. http://dx.doi.org/10.17762/ijritcc.v11i9s.7400.
Texto completoSumahasan, S. y D. Rajyalakshmi. "An Optimized Node Level Lightweight Security Algorithm for Cloud Assisted-IoT". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 9s (31 de agosto de 2023): 78–87. http://dx.doi.org/10.17762/ijritcc.v11i9s.7399.
Texto completoAnokhina, T. Y. y T. N. Zaitseva. "AUDIOVISUAL RECORDS AS A SOCIOCULTURAL PHENOMENON: PROBLEMS OF CREATION, STORAGE AND DEVELOPMENT PROSPECTS". KAZAN SOCIALLY-HUMANITARIAN BULLETIN 11, n.º 2 (febrero de 2020): 4–8. http://dx.doi.org/10.24153/2079-5912-2020-11-2-4-8.
Texto completoFu, Siyi y Kaza Mojtahe. "Harr-NMF Feature Extraction for Multilevel Educational Technology Teaching Big Data System". Security and Communication Networks 2022 (18 de mayo de 2022): 1–12. http://dx.doi.org/10.1155/2022/3178763.
Texto completoZhang, Ping, Jinbo Li y Zhumu Fu. "Public Key Encryption with Equality Test in a Cloud Environment". Information 13, n.º 6 (24 de mayo de 2022): 265. http://dx.doi.org/10.3390/info13060265.
Texto completoTseng, Yi-Fan, Zi-Yuan Liu, Jen-Chieh Hsu y Raylin Tso. "Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function". Security and Communication Networks 2021 (12 de febrero de 2021): 1–12. http://dx.doi.org/10.1155/2021/6678194.
Texto completo