Articoli di riviste sul tema "Information storage and retrieval systems - security"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Information storage and retrieval systems - security".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Arunarani, Ar, e D. Manjula Perkinian. "Intelligent Techniques for Providing Effective Security to Cloud Databases". International Journal of Intelligent Information Technologies 14, n. 1 (gennaio 2018): 1–16. http://dx.doi.org/10.4018/ijiit.2018010101.
Testo completoKovalcik, Justin, e Mike Villalobos. "Automated Storage & Retrieval System". Information Technology and Libraries 38, n. 4 (16 dicembre 2019): 114–24. http://dx.doi.org/10.6017/ital.v38i4.11273.
Testo completoBidve, Vijaykumar, Kiran Kakakde, Pakiriswamy Sarasu, Shailesh Kediya, Pradip Tamkhade e Suprakash Sudarsanan Nair. "Patient data management using blockchain technology". Indonesian Journal of Electrical Engineering and Computer Science 32, n. 3 (1 dicembre 2023): 1746. http://dx.doi.org/10.11591/ijeecs.v32.i3.pp1746-1754.
Testo completoShojaei, Parisasadat, Elena Vlahu-Gjorgievska e Yang-Wai Chow. "Security and Privacy of Technologies in Health Information Systems: A Systematic Literature Review". Computers 13, n. 2 (31 gennaio 2024): 41. http://dx.doi.org/10.3390/computers13020041.
Testo completoXie, Run, Chanlian He, Dongqing Xie, Chongzhi Gao e Xiaojun Zhang. "A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage". Security and Communication Networks 2018 (6 giugno 2018): 1–7. http://dx.doi.org/10.1155/2018/7254305.
Testo completoPing, Yuan, Wei Song, Zhili Zhang, Weiping Wang e Baocang Wang. "A Multi-Keyword Searchable Encryption Scheme Based on Probability Trapdoor over Encryption Cloud Data". Information 11, n. 8 (12 agosto 2020): 394. http://dx.doi.org/10.3390/info11080394.
Testo completoFolasole, Adetayo, Oluwasegun Solomon Adegboye, Oluwaseun Isaiah Ekuewa e Patience Emanre Eshua. "Security, Privacy Challenges and Available Countermeasures in Electronic Health Record Systems: A Review". European Journal of Electrical Engineering and Computer Science 7, n. 6 (13 novembre 2023): 27–33. http://dx.doi.org/10.24018/ejece.2023.7.6.561.
Testo completoZhang, Qiuyu, Minrui Fu, Yibo Huang e Zhenyu Zhao. "Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage". Security and Communication Networks 2022 (30 marzo 2022): 1–14. http://dx.doi.org/10.1155/2022/9045259.
Testo completoLi, Weijing, Zicheng Zhou, Wen Fan e Juan Gao. "Design of Data Sharing Platform Based on Blockchain and IPFS Technology". Wireless Communications and Mobile Computing 2022 (13 luglio 2022): 1–7. http://dx.doi.org/10.1155/2022/3937725.
Testo completoTaipalus, Toni, Hilkka Grahn, Hannu Turtiainen e Andrei Costin. "Utilizing Vector Database Management Systems in Cyber Security". European Conference on Cyber Warfare and Security 23, n. 1 (21 giugno 2024): 560–65. http://dx.doi.org/10.34190/eccws.23.1.2220.
Testo completoGatkal, Suyog, Vinayak Dhage, Dhanashree Kalekar e Sanket Ghadge. "Survey on Medical Data Storage Systems". International Journal of Soft Computing and Engineering 11, n. 1 (30 settembre 2021): 44–48. http://dx.doi.org/10.35940/ijsce.a3528.0911121.
Testo completoHamid, Yasir, Rameez Yousuf e Atif Chowhan. "Security in Health Information Management Records through Blockchain Technology". Journal of Information Security and Cybercrimes Research 6, n. 1 (30 giugno 2023): 24–39. http://dx.doi.org/10.26735/qbij3667.
Testo completoRashid, Mustafa Noori, Leith Hamid Abed e Waleed Kareem Awad. "Financial information security using hybrid encryption technique on multi-cloud architecture". Bulletin of Electrical Engineering and Informatics 11, n. 6 (1 dicembre 2022): 3450–61. http://dx.doi.org/10.11591/eei.v11i6.3967.
Testo completoGupta, Daya Sagar, e G. P. Biswas. "Secure Computation on Cloud Storage". Journal of Cases on Information Technology 17, n. 3 (luglio 2015): 22–29. http://dx.doi.org/10.4018/jcit.2015070103.
Testo completoZhou, Wenbo. "MSCFS-RP: A Colored-Petri-Net-Based Analysis Model for Master–Slave Cloud File Systems with Replication Pipelining". Electronics 13, n. 14 (19 luglio 2024): 2852. http://dx.doi.org/10.3390/electronics13142852.
Testo completoAlsudani, Mustafa Qahtan, Hassan Falah Fakhruldeen, Heba Abdul-Jaleel Al-Asady e Feryal Ibrahim Jabbar. "Storage and encryption file authentication for cloud-based data retrieval". Bulletin of Electrical Engineering and Informatics 11, n. 2 (1 aprile 2022): 1110–16. http://dx.doi.org/10.11591/eei.v11i2.3344.
Testo completoShyam, Shyam, Pankaj Kumar, Rajeev Shrivastava, Satyabrata Jena, Tushar Kumar Pandey e Ankita Nigam. "Innovations in Cyber Security Algorithms for Databases Enhancing Data Retrieval and Management". Journal of Cybersecurity and Information Management 13, n. 2 (2024): 191–98. http://dx.doi.org/10.54216/jcim.130215.
Testo completoAl-Mayali, Yahya Mahdi Hadi, e Zahraa Yahya Mahdi Al-Mayali. "Digitization, and Coding, with Optimizing, of Iraqi Personnel Home Addresses forward, minimizing Storage Space, and Processing time". BIO Web of Conferences 97 (2024): 00028. http://dx.doi.org/10.1051/bioconf/20249700028.
Testo completoMishari Abdullah, AL Ajery,, Thamari, Abdullah Ali, Al Malki, Faisal Hamed, Khormi, Ahmed Abdu e Al Farshan, Salem Mohammed. "THE EVOLUTION OF MEDICAL INFORMATION MANAGEMENT: PAST, PRESENT, AND FUTURE PERSPECTIVES". EPH - International Journal of Medical and Health Science 8, n. 2 (11 giugno 2022): 22–30. http://dx.doi.org/10.53555/eijmhs.v8i2.181.
Testo completoN. Mhawi, Doaa, Haider W. Oleiwi e Heba L. Al-Taie. "Generating Encrypted Document Index Structure Using Tree Browser". Journal of Techniques 5, n. 2 (26 giugno 2023): 114–22. http://dx.doi.org/10.51173/jt.v5i2.948.
Testo completoDing, Yong, Hui Xu, Yujue Wang, Fang Yuan e Hai Liang. "Secure Multi-Keyword Search and Access Control over Electronic Health Records in Wireless Body Area Networks". Security and Communication Networks 2021 (29 settembre 2021): 1–11. http://dx.doi.org/10.1155/2021/9520941.
Testo completoMaosa, Herbert, Karim Ouazzane e Viktor Sowinski-Mydlarz. "Real-Time Cyber Analytics Data Collection Framework". International Journal of Information Security and Privacy 16, n. 1 (1 gennaio 2022): 1–10. http://dx.doi.org/10.4018/ijisp.311465.
Testo completoSantiañez, Reymon M., e Benedict M. Sollano. "Development and Evaluation of Local Area Network Based Archiving System". American Journal of Agricultural Science, Engineering and Technology 5, n. 2 (29 novembre 2021): 286–96. http://dx.doi.org/10.54536/ajaset.v5i2.107.
Testo completoBudati, Anil Kumar, Sridhar Reddy Vulapula, Syed Bilal Hussian Shah, Anas Al-Tirawi e Anil Carie. "Secure Multi-Level Privacy-Protection Scheme for Securing Private Data over 5G-Enabled Hybrid Cloud IoT Networks". Electronics 12, n. 7 (30 marzo 2023): 1638. http://dx.doi.org/10.3390/electronics12071638.
Testo completoLazim Lafta, Ali, e Ayad I. Abdulsada. "SMPP-CBIR: shorted and mixed aggregated image features for privacy-preserving content-based image retrieval". Bulletin of Electrical Engineering and Informatics 11, n. 5 (1 ottobre 2022): 2930–37. http://dx.doi.org/10.11591/eei.v11i5.4323.
Testo completoDu, Haorui, Jianhua Chen, Fei Lin, Cong Peng e Debiao He. "A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing". Security and Communication Networks 2022 (15 ottobre 2022): 1–15. http://dx.doi.org/10.1155/2022/2309834.
Testo completoAbida Khanam. ""Ensuring Security in Electronic Health Records: Implementing and Validating a Blockchain and IPFS Framework"". Journal of Electrical Systems 20, n. 7s (4 maggio 2024): 2356–68. http://dx.doi.org/10.52783/jes.3972.
Testo completoKumar Barai, Dilip, G. Sridevi, Syed Umar e MSR Prasad. "Information Base Security Threats and Challenges' in Information Forensic: A Survey". Indonesian Journal of Electrical Engineering and Computer Science 1, n. 2 (1 febbraio 2016): 406. http://dx.doi.org/10.11591/ijeecs.v1.i2.pp406-410.
Testo completoMei, Zhuolin, Jing Yu, Jinzhou Huang, Bin Wu, Zhiqiang Zhao, Caicai Zhang, Jiaoli Shi, Xiancheng Wang e Zongda Wu. "Secure Cloud Storage and Retrieval of Personal Health Data From Smart Wearable Devices With Privacy-Preserving Techniques". International Journal of Web Services Research 20, n. 1 (5 ottobre 2023): 1–18. http://dx.doi.org/10.4018/ijwsr.331388.
Testo completoD. Rajalakshmi, Et al. "HealthBlock: A Blockchain-IoT Fusion for Secure Healthcare Data Exchange". International Journal on Recent and Innovation Trends in Computing and Communication 11, n. 9 (5 novembre 2023): 2018–23. http://dx.doi.org/10.17762/ijritcc.v11i9.9199.
Testo completoJain, Paras, Sunita Dwivedi, Adel R. Alharbi, R. Sureshbabu, Devesh Pratap Singh, Sajjad Shaukat Jamal e Daniel Krah. "Blockchain-Enabled Smart Surveillance System with Artificial Intelligence". Wireless Communications and Mobile Computing 2022 (6 maggio 2022): 1–9. http://dx.doi.org/10.1155/2022/2792639.
Testo completoThigale, Satyam R. "Multiple Keyword Search in Cloud Data". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n. 04 (9 aprile 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30422.
Testo completoFATIEIEVA, Anastasiia. "Information systems in the enterprise's management". Economics. Finances. Law, n. 6/1 (26 giugno 2020): 11–15. http://dx.doi.org/10.37634/efp.2020.6(1).2.
Testo completoAl-Mukhtar, Wijdan Noaman Marzoog. "Enhancing Data Security in Cloud Computing: A Comparative Analysis of Encryption Techniques". International Journal on Recent and Innovation Trends in Computing and Communication 11, n. 11 (30 novembre 2023): 195–207. http://dx.doi.org/10.17762/ijritcc.v11i11.9306.
Testo completoGouveia Junior, Mário. "O pensamento de baumaniano e os paradigmas de mediação da informação". RDBCI: Revista Digital de Biblioteconomia e Ciência da Informação 13, n. 1 (30 gennaio 2015): 156. http://dx.doi.org/10.20396/rdbci.v13i1.1586.
Testo completoJayathissa, Prabath, e Roshan Hewapathrana. "HAPI-FHIR Server Implementation to Enhancing Interoperability among Primary Care Health Information Systems in Sri Lanka: Review of the Technical Use Case". European Modern Studies Journal 7, n. 6 (1 febbraio 2024): 225–41. http://dx.doi.org/10.59573/emsj.7(6).2023.23.
Testo completoYe, Xubo, e Mababa Jonilo. "Unleashing the Power of Big Data: Designing a Robust Business Intelligence Framework for E-commerce Data Analytics". Journal of Information Systems Engineering and Management 8, n. 3 (29 novembre 2023): 22638. http://dx.doi.org/10.55267/iadt.07.13946.
Testo completoKumar, Sarvesh, Mohammed Abdul Wajeed, Rajashekhar Kunabeva, Nripendra Dwivedi, Prateek Singhal, Sajjad Shaukat Jamal e Reynah Akwafo. "Novel Method for Safeguarding Personal Health Record in Cloud Connection Using Deep Learning Models". Computational Intelligence and Neuroscience 2022 (19 marzo 2022): 1–14. http://dx.doi.org/10.1155/2022/3564436.
Testo completoWang, Miye, Sheyu Li, Tao Zheng, Nan Li, Qingke Shi, Xuejun Zhuo, Renxin Ding e Yong Huang. "Big Data Health Care Platform With Multisource Heterogeneous Data Integration and Massive High-Dimensional Data Governance for Large Hospitals: Design, Development, and Application". JMIR Medical Informatics 10, n. 4 (13 aprile 2022): e36481. http://dx.doi.org/10.2196/36481.
Testo completoReddy, Vonteru Srikanth, e Kumar Debasis. "Statistical Review of Health Monitoring Models for Real-Time Hospital Scenarios". International Journal on Recent and Innovation Trends in Computing and Communication 11, n. 7s (13 luglio 2023): 465–81. http://dx.doi.org/10.17762/ijritcc.v11i7s.7025.
Testo completoRakhmawati, Rina, Elya Riska Dwi Wahyuni, Walda Khoiriyah, Titi Susanti e Dwi Noviana Purnamasari. "Open Journal System (OJS) As An Office Automation Model". Diplomatika: Jurnal Kearsipan Terapan 5, n. 1 (11 gennaio 2023): 1. http://dx.doi.org/10.22146/diplomatika.68200.
Testo completoZhao, Meng, e Yong Ding. "Dual-Server Identity-Based Encryption with Authorized Equality Test for IoT Data in Clouds". Security and Communication Networks 2022 (11 ottobre 2022): 1–12. http://dx.doi.org/10.1155/2022/4905763.
Testo completoChen, Zhenwei, Axin Wu, Yifei Li, Qixuan Xing e Shengling Geng. "Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing". Security and Communication Networks 2021 (20 gennaio 2021): 1–11. http://dx.doi.org/10.1155/2021/6619689.
Testo completoShinkar, Sonali V., e Dolly Thankachan. "SCMBQA: Design of a Customised SCM-Aware Sidechaining Model for QoS Enhancement under Attack Scenarios". International Journal on Recent and Innovation Trends in Computing and Communication 10, n. 1s (10 dicembre 2022): 200–212. http://dx.doi.org/10.17762/ijritcc.v10i1s.5824.
Testo completoBommala, Harikrishna, Sireesha Vikkurty, K. Ramesh Babu e Bhargavi Peddi Reddy. "Security Issues in Service Model of Fog Computing Environment". International Journal on Recent and Innovation Trends in Computing and Communication 11, n. 9s (31 agosto 2023): 88–92. http://dx.doi.org/10.17762/ijritcc.v11i9s.7400.
Testo completoSumahasan, S., e D. Rajyalakshmi. "An Optimized Node Level Lightweight Security Algorithm for Cloud Assisted-IoT". International Journal on Recent and Innovation Trends in Computing and Communication 11, n. 9s (31 agosto 2023): 78–87. http://dx.doi.org/10.17762/ijritcc.v11i9s.7399.
Testo completoAnokhina, T. Y., e T. N. Zaitseva. "AUDIOVISUAL RECORDS AS A SOCIOCULTURAL PHENOMENON: PROBLEMS OF CREATION, STORAGE AND DEVELOPMENT PROSPECTS". KAZAN SOCIALLY-HUMANITARIAN BULLETIN 11, n. 2 (febbraio 2020): 4–8. http://dx.doi.org/10.24153/2079-5912-2020-11-2-4-8.
Testo completoFu, Siyi, e Kaza Mojtahe. "Harr-NMF Feature Extraction for Multilevel Educational Technology Teaching Big Data System". Security and Communication Networks 2022 (18 maggio 2022): 1–12. http://dx.doi.org/10.1155/2022/3178763.
Testo completoZhang, Ping, Jinbo Li e Zhumu Fu. "Public Key Encryption with Equality Test in a Cloud Environment". Information 13, n. 6 (24 maggio 2022): 265. http://dx.doi.org/10.3390/info13060265.
Testo completoTseng, Yi-Fan, Zi-Yuan Liu, Jen-Chieh Hsu e Raylin Tso. "Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function". Security and Communication Networks 2021 (12 febbraio 2021): 1–12. http://dx.doi.org/10.1155/2021/6678194.
Testo completo