Artykuły w czasopismach na temat „CLOUD OF SECRECY”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „CLOUD OF SECRECY”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Gosavi, Mr Abhijeet, Mr Sakib Shaikh, Mr Adnan Sayyed, Mr Somesh Sapa, Mr Ayan Shaikh i Prof A. A. Pund. "Enabling Encrypted Cloud Emails with Data Encryption using Advanced Encryption Techniques". International Journal for Research in Applied Science and Engineering Technology 11, nr 6 (30.06.2023): 864–69. http://dx.doi.org/10.22214/ijraset.2023.53709.
Pełny tekst źródłaAnjaneyulu, GSGN, Yogendra Singh Sisodiya i Kumar Saurav. "Novel Composite Encryption for Secrecy in Cloud Computing". Research Journal of Pharmacy and Technology 9, nr 9 (2016): 1501. http://dx.doi.org/10.5958/0974-360x.2016.00292.4.
Pełny tekst źródłaRajkumar, N., i E. Kannan. "Attribute-Based Collusion Resistance in Group-Based Cloud Data Sharing using LKH Model". Journal of Circuits, Systems and Computers 29, nr 02 (9.05.2019): 2030001. http://dx.doi.org/10.1142/s0218126620300019.
Pełny tekst źródłaK, Sudha, i Dr Umarani C. "Security Framework for Cloud Information under Transparency of a Key". International Journal for Research in Applied Science and Engineering Technology 10, nr 4 (30.04.2022): 1429–36. http://dx.doi.org/10.22214/ijraset.2022.41550.
Pełny tekst źródłaPark, Junyoung, i Eui-Nam Huh. "eCLASS: Edge-Cloud-Log Assuring-Secrecy Scheme for Digital Forensics". Symmetry 11, nr 10 (22.09.2019): 1192. http://dx.doi.org/10.3390/sym11101192.
Pełny tekst źródłaNagaraju, Dr Sabout, S. K. V. Jayakumar i C. Swetha Priya. "Efficient Multi-linear Key Pairing Cryptosystem for Reliable Cloud-based Service Provisioning". Revista Gestão Inovação e Tecnologias 11, nr 4 (13.08.2021): 4440–55. http://dx.doi.org/10.47059/revistageintec.v11i4.2471.
Pełny tekst źródłaKhan, Yunus, i Sunita Verma. "An Intelligent Blockchain and Software-Defined Networking-Based Evidence Collection Architecture for Cloud Environment". Scientific Programming 2021 (29.09.2021): 1–19. http://dx.doi.org/10.1155/2021/7294206.
Pełny tekst źródłaAgarkhed, Jayashree, i R. Ashalatha. "Data Privacy and Security in Cloud Environment Using Cryptography Approach". Asian Journal of Computer Science and Technology 7, nr 1 (5.05.2018): 50–54. http://dx.doi.org/10.51983/ajcst-2018.7.1.1830.
Pełny tekst źródłaQin, Bo, Huaqun Wang, Qianhong Wu, Jianwei Liu i Josep Domingo-Ferrer. "Simultaneous authentication and secrecy in identity-based data upload to cloud". Cluster Computing 16, nr 4 (23.04.2013): 845–59. http://dx.doi.org/10.1007/s10586-013-0258-7.
Pełny tekst źródłaSrilakshmi, K., i P. Bhargavi. "Cloud Computing Security Using Cryptographic Algorithms". Asian Journal of Computer Science and Technology 8, S3 (5.06.2019): 76–80. http://dx.doi.org/10.51983/ajcst-2019.8.s3.2082.
Pełny tekst źródłaJanjua, Kanwal, Munam Ali Shah, Ahmad Almogren, Hasan Ali Khattak, Carsten Maple i Ikram Ud Din. "Proactive Forensics in IoT: Privacy-Aware Log-Preservation Architecture in Fog-Enabled-Cloud Using Holochain and Containerization Technologies". Electronics 9, nr 7 (19.07.2020): 1172. http://dx.doi.org/10.3390/electronics9071172.
Pełny tekst źródłaSahar Altaf, Muhammad Wajahat Ali, Muhammad Waqar Khan, Sumaira Yousuf Khan,. "A REVIEW OF THE SECURITY ISSUES IN CLOUD COMPUTING AND ITS REMEDIAL ACTION". INFORMATION TECHNOLOGY IN INDUSTRY 9, nr 1 (2.03.2021): 444–55. http://dx.doi.org/10.17762/itii.v9i1.150.
Pełny tekst źródłaIzang, A. A., Y. A. Mensah, O. J. Omotosho i C. P. Obioma. "Overview of Cloud Computing and Recent Addendum". Journal of Communications Technology, Electronics and Computer Science 5 (10.05.2016): 26. http://dx.doi.org/10.22385/jctecs.v5i0.93.
Pełny tekst źródłaKanashevskiy, V. A. "Legal problems of using cloud services of foreign providers by Russian banks". Lex Russica, nr 3 (5.04.2019): 108–15. http://dx.doi.org/10.17803/1729-5920.2019.148.3.108-115.
Pełny tekst źródłaChiou, Shin-Yan. "A Secure Distributed Cloud Storage System Achieving Data Secrecy and Load Balance". International Journal of Security and Its Applications 11, nr 10 (31.10.2017): 1–14. http://dx.doi.org/10.14257/ijsia.2017.11.10.01.
Pełny tekst źródłaKim, Byung Wook. "Secrecy Dimming Capacity in Multi-LED PAM-Based Visible Light Communications". Wireless Communications and Mobile Computing 2017 (2017): 1–6. http://dx.doi.org/10.1155/2017/4094096.
Pełny tekst źródłaNOMURA, Kenta, Masami MOHRI, Yoshiaki SHIRAISHI i Masakatu MORII. "Attribute Revocable Multi-Authority Attribute-Based Encryption with Forward Secrecy for Cloud Storage". IEICE Transactions on Information and Systems E100.D, nr 10 (2017): 2420–31. http://dx.doi.org/10.1587/transinf.2016ofp0004.
Pełny tekst źródłaA., Mohan, i vamshikrishna P. "Accounting and Privacy Preserving of Data Owner in Cloud Storage". International Journal of Innovative Technology and Exploring Engineering 10, nr 6 (30.04.2021): 14–17. http://dx.doi.org/10.35940/ijitee.f8715.0410621.
Pełny tekst źródłaChennam, Krishna Keerthi, i M. Akka Lakshmi. "Cloud Security in Crypt Database Server Using Fine Grained Access Control". International Journal of Electrical and Computer Engineering (IJECE) 6, nr 3 (1.06.2016): 915. http://dx.doi.org/10.11591/ijece.v6i3.8925.
Pełny tekst źródłaChennam, Krishna Keerthi, i M. Akka Lakshmi. "Cloud Security in Crypt Database Server Using Fine Grained Access Control". International Journal of Electrical and Computer Engineering (IJECE) 6, nr 3 (1.06.2016): 915. http://dx.doi.org/10.11591/ijece.v6i3.pp915-924.
Pełny tekst źródłaMuhammad Arslan Tariq, Muhammad Arslan Tariq. "Anomaly based Intrusion Detection System". International Journal for Electronic Crime Investigation 3, nr 3 (6.09.2019): 7. http://dx.doi.org/10.54692/ijeci.2020.030341.
Pełny tekst źródłaMuhammad Arslan Tariq, Muhammad Arslan Tariq. "Anomaly based Intrusion Detection System". International Journal for Electronic Crime Investigation 3, nr 3 (6.09.2019): 7. http://dx.doi.org/10.54692/ijeci.2020.030336.
Pełny tekst źródłaMuhammad Arslan Tariq, Muhammad Arslan Tariq. "Anomaly based Intrusion Detection System". International Journal for Electronic Crime Investigation 3, nr 3 (6.09.2019): 7. http://dx.doi.org/10.54692/ijeci.2019.030341.
Pełny tekst źródłaMuhammad Arslan Tariq, Muhammad Arslan Tariq. "Anomaly based Intrusion Detection System". International Journal for Electronic Crime Investigation 3, nr 3 (6.09.2019): 7. http://dx.doi.org/10.54692/ijeci.2019.030336.
Pełny tekst źródłaShi, Yanfeng, i Shuo Qiu. "Ciphertext-Policy Attribute-Based Encryption with Outsourced Set Intersection in Multimedia Cloud Computing". Electronics 10, nr 21 (3.11.2021): 2685. http://dx.doi.org/10.3390/electronics10212685.
Pełny tekst źródłaN. Sarode, Snehal, i Geetha R. Chillarge. "Efficient and Secure Multi-Keyword Ranked Search and Group Data Sharing for Encrypted Cloud Data". Journal of Scientific Research 66, nr 02 (2022): 68–78. http://dx.doi.org/10.37398/jsr.2022.660210.
Pełny tekst źródłaKwofie, A., i A. A. Barik. "Cloud Security: Using Advance Encryption Standard Algorithm to Secure Cloud Data at Client Side and Taking Measures to Protect its Secrecy". International Journal of Advance Research and Innovation 8, nr 3 (2020): 11–14. http://dx.doi.org/10.51976/ijari.832003.
Pełny tekst źródłaKwao Dawson, John, Frimpong Twum, James Benjamin Hayfron Acquah i Yaw Marfo Missah. "PRISMA Archetype-Based Systematic Literature Review of Security Algorithms in the Cloud". Security and Communication Networks 2023 (3.07.2023): 1–17. http://dx.doi.org/10.1155/2023/9210803.
Pełny tekst źródłaKumariK, Anitha, Sudha Sadasivam G i Madhumitha R. "Solution to Security and Secrecy in Cloud Environment using PAKE Protocol - A Bibliographic Survey". International Journal of Computer Applications 96, nr 2 (18.06.2014): 26–36. http://dx.doi.org/10.5120/16767-6334.
Pełny tekst źródłaWang, Chenyu, Ke Ding, Bin Li, Yiming Zhao, Guoai Xu, Yanhui Guo i Ping Wang. "An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment". Wireless Communications and Mobile Computing 2018 (1.10.2018): 1–13. http://dx.doi.org/10.1155/2018/3048697.
Pełny tekst źródłaAl-Sayyed, Rizik M. H., Wadi’ A. Hijawi, Anwar M. Bashiti, Ibrahim AlJarah, Nadim Obeid i Omar Y. A. Al-Adwan. "An Investigation of Microsoft Azure and Amazon Web Services from Users’ Perspectives". International Journal of Emerging Technologies in Learning (iJET) 14, nr 10 (30.05.2019): 217. http://dx.doi.org/10.3991/ijet.v14i10.9902.
Pełny tekst źródłaWang, Feifei, Guosheng Xu, Guoai Xu, Yuejie Wang i Junhao Peng. "A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure". Wireless Communications and Mobile Computing 2020 (18.02.2020): 1–15. http://dx.doi.org/10.1155/2020/3805058.
Pełny tekst źródłaD, Ramesh, i Rama B. "Secure Privacy Implications for Clients and End-users through Key Assortment Crypto Techniques Implicated Algorithm". International Journal of Electrical and Computer Engineering (IJECE) 8, nr 6 (1.12.2018): 5443. http://dx.doi.org/10.11591/ijece.v8i6.pp5443-5448.
Pełny tekst źródłaAbouljam, Sana Mohammed, i Tulika . "Cloud based secured privacy preserving protocol for vehicular DTNS". International Journal of Engineering & Technology 7, nr 1.1 (21.12.2017): 199. http://dx.doi.org/10.14419/ijet.v7i1.1.9455.
Pełny tekst źródłaRavichandran, S., i J. Sathiamoorthy. "An Innovative Performance of Refuge using Stowage Main Servers in Cloud Computing Equipment". Asian Journal of Computer Science and Technology 10, nr 1 (5.05.2021): 13–17. http://dx.doi.org/10.51983/ajcst-2021.10.1.2695.
Pełny tekst źródłaLai, Jian-Foo, i Swee-Huay Heng. "Secure File Storage On Cloud Using Hybrid Cryptography". Journal of Informatics and Web Engineering 1, nr 2 (15.09.2022): 1–18. http://dx.doi.org/10.33093/jiwe.2022.1.2.1.
Pełny tekst źródłaAlsaedi, Emad, i Alaa Kadhim. "A comparative study of combining deep learning and homomorphic encryption techniques". Al-Qadisiyah Journal Of Pure Science 27, nr 1 (13.03.2022): 17–33. http://dx.doi.org/10.29350/qjps.2022.27.1.1452.
Pełny tekst źródłaZakria Mahrousa, Mahmoud Rahhal, Nairouz Alzin, Zakria Mahrousa, Mahmoud Rahhal, Nairouz Alzin. "Hybrid Secure Model for Securing Data in The Cloud Computing System by Combining RSA, AES and CP-ABE: نموذج هجين آمن لحماية البيانات في الحوسبة السحابية بدمج RSA وAES وCP-ABE". Journal of engineering sciences and information technology 5, nr 4 (30.12.2021): 80–59. http://dx.doi.org/10.26389/ajsrp.z110521.
Pełny tekst źródłaCutugno, Matteo, Umberto Robustelli i Giovanni Pugliano. "Structure-from-Motion 3D Reconstruction of the Historical Overpass Ponte della Cerra: A Comparison between MicMac® Open Source Software and Metashape®". Drones 6, nr 9 (6.09.2022): 242. http://dx.doi.org/10.3390/drones6090242.
Pełny tekst źródłaYoun, Taek-Young, i Hyun Sook Rhee. "Secure Symmetric Keyword Search with Keyword Privacy for Cloud Storage Services". Security and Communication Networks 2021 (30.11.2021): 1–8. http://dx.doi.org/10.1155/2021/2291470.
Pełny tekst źródłaSomaru, Navilla, i Christa Rautenbach. "Non-criminal dispute resolution in South Africa’s criminal justice system: Proposals for reform". South African Journal of Criminal Justice 33, nr 3 (2020): 646–69. http://dx.doi.org/10.47348/sacj/v33/i3a7.
Pełny tekst źródłaSastry, J. K. R., i M. Trinath Basu. "Securing multi-tenancy systems through multi DB instances and multiple databases on different physical servers". International Journal of Electrical and Computer Engineering (IJECE) 9, nr 2 (1.04.2019): 1385. http://dx.doi.org/10.11591/ijece.v9i2.pp1385-1392.
Pełny tekst źródłaHan, Linrui. "Personal Privacy Data Protection in Location Recommendation System". Journal of Physics: Conference Series 2138, nr 1 (1.12.2021): 012026. http://dx.doi.org/10.1088/1742-6596/2138/1/012026.
Pełny tekst źródłaSai Ji, Sai Ji, Yang Yuan Sai Ji, Jian Shen Yang Yuan, Chin-Feng Lai Jian Shen i Bofan Chen Chin-Feng Lai. "An Efficient Three-Party Authentication and Key Agreement Protocol for Privacy-Preserving of IoT Devices in Mobile Edge Computing". 網際網路技術學刊 23, nr 3 (maj 2022): 437–48. http://dx.doi.org/10.53106/160792642022052303002.
Pełny tekst źródłaMeka, Likhita, i Srivyshnavi Pagadala. "Providing a Secure Cloud Storage by Using Attribute Based Temporary Key Word Search Scheme". Asian Journal of Computer Science and Technology 8, S3 (5.06.2019): 117–21. http://dx.doi.org/10.51983/ajcst-2019.8.s3.2825.
Pełny tekst źródłaB, Aravind, Harikrishnan S, Santhosh G, Vijay J.E i Saran Suaji T. "An Efficient Privacy - Aware Authentication Framework for Mobile Cloud Computing". International Academic Journal of Innovative Research 10, nr 1 (20.04.2023): 1–7. http://dx.doi.org/10.9756/iajir/v10i1/iajir1001.
Pełny tekst źródłaMuhammad Umar Munir, Ghulam Abbas Khan i Arslan Ammin. "Generic Framework Related to Database Forensics and Security Countermeasures". Journal of Computing & Biomedical Informatics 1, nr 01 (15.09.2020): 15–30. http://dx.doi.org/10.56979/101/2020/42.
Pełny tekst źródłaMuhammad, Irfan, Hirley Alves, Onel Alcaraz López i Matti Latva-aho. "Secure Rate Control and Statistical QoS Provisioning for Cloud-Based IoT Networks". Security and Communication Networks 2021 (29.10.2021): 1–19. http://dx.doi.org/10.1155/2021/8650272.
Pełny tekst źródłaAlzuwaini, Mustafa, i Ali Yassin. "An Efficient Mechanism to Prevent the Phishing Attacks". Iraqi Journal for Electrical and Electronic Engineering 17, nr 1 (19.05.2021): 1–11. http://dx.doi.org/10.37917/ijeee.17.1.15.
Pełny tekst źródłaJamjoom, Mona, Hussein Abulkasim i Safia Abbas. "Lightweight Authenticated Privacy-Preserving Secure Framework for the Internet of Vehicles". Security and Communication Networks 2022 (9.09.2022): 1–11. http://dx.doi.org/10.1155/2022/6573060.
Pełny tekst źródła