Gotowa bibliografia na temat „DNA-based secure data storage”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „DNA-based secure data storage”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "DNA-based secure data storage"
P., Poonguzhali, Prajyot Dhanokar, M. K. Chaithanya i Mahesh U. Patil. "Secure Storage of Data on Android Based Devices". International Journal of Engineering and Technology 8, nr 3 (marzec 2016): 177–82. http://dx.doi.org/10.7763/ijet.2016.v6.880.
Pełny tekst źródłaP., Poonguzhali, Prajyot Dhanokar, M. K. Chaithanya i Mahesh U. Patil. "Secure Storage of Data on Android Based Devices". International Journal of Engineering and Technology 8, nr 3 (marzec 2016): 177–82. http://dx.doi.org/10.7763/ijet.2016.v8.880.
Pełny tekst źródłaChen, Kaikai, Jinbo Zhu, Filip Bošković i Ulrich F. Keyser. "Nanopore-Based DNA Hard Drives for Rewritable and Secure Data Storage". Nano Letters 20, nr 5 (30.03.2020): 3754–60. http://dx.doi.org/10.1021/acs.nanolett.0c00755.
Pełny tekst źródłaManimekalai, R., i M. Chandra Kumar Peter. "Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud". International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (30.06.2018): 252–54. http://dx.doi.org/10.31142/ijtsrd13014.
Pełny tekst źródłaS, Rajasekaran, Kalifulla Y, Murugesan S, Ezhilvendan M i Gunasekaran J. "Authentication Based Cloud Storage and Secure Data Forwarding". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, nr 1 (1.02.2013): 106–10. http://dx.doi.org/10.24297/ijct.v4i1b.3068.
Pełny tekst źródłaGo, Woong, i Jin Kwak. "Dual server-based secure data-storage system for cloud storage". International Journal of Engineering Systems Modelling and Simulation 6, nr 1/2 (2014): 86. http://dx.doi.org/10.1504/ijesms.2014.058428.
Pełny tekst źródłaChenchen Han, Chenchen Han, Gwang-Jun Kim Chenchen Han, Osama Alfarraj Gwang-Jun Kim, Amr Tolba Osama Alfarraj i Yongjun Ren Amr Tolba. "ZT-BDS: A Secure Blockchain-based Zero-trust Data Storage Scheme in 6G Edge IoT". 網際網路技術學刊 23, nr 2 (marzec 2022): 289–95. http://dx.doi.org/10.53106/160792642022032302009.
Pełny tekst źródłaYuliang Shi, Kun Zhang i Qingzhong Li. "Meta-data Driven Data Chunk Based Secure Data Storage for SaaS". International Journal of Digital Content Technology and its Applications 5, nr 1 (31.01.2011): 173–85. http://dx.doi.org/10.4156/jdcta.vol5.issue1.18.
Pełny tekst źródłaHsiao-Ying Lin i Wen-Guey Tzeng. "A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding". IEEE Transactions on Parallel and Distributed Systems 23, nr 6 (czerwiec 2012): 995–1003. http://dx.doi.org/10.1109/tpds.2011.252.
Pełny tekst źródłaJaved, Muhammad Umar, Mubariz Rehman, Nadeem Javaid, Abdulaziz Aldegheishem, Nabil Alrajeh i Muhammad Tahir. "Blockchain-Based Secure Data Storage for Distributed Vehicular Networks". Applied Sciences 10, nr 6 (16.03.2020): 2011. http://dx.doi.org/10.3390/app10062011.
Pełny tekst źródłaRozprawy doktorskie na temat "DNA-based secure data storage"
Yu, Shucheng. "Data Sharing on Untrusted Storage with Attribute-Based Encryption". Digital WPI, 2010. https://digitalcommons.wpi.edu/etd-dissertations/321.
Pełny tekst źródłaMészáros, István. "Distributed P2P Data Backup System". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-236378.
Pełny tekst źródłaSharma, Munish. "SHARIF: Solid Pod based Secured Healthcare Information Storage and Exchange Solution". Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-105147.
Pełny tekst źródłaGermishuizen, Willem Andreas. "Dielectrophoresis as an addressing mechanism in a novel data storage system based on DNA". Thesis, University of Cambridge, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.615680.
Pełny tekst źródłaFramner, Erik. "A Configuration User Interface for Multi-Cloud Storage Based on Secret Sharing : An Exploratory Design Study". Thesis, Karlstads universitet, Handelshögskolan (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-71354.
Pełny tekst źródłaPRISMACLOUD
Camerlengo, Terry Luke. "Techniques for Storing and Processing Next-Generation DNA Sequencing Data". The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1388502159.
Pełny tekst źródłaShi, Peihan, i 施姵含. "Security Mechanisms for Cloud Data Storage based on Bitemporal Database and Secret Sharing". Thesis, 2012. http://ndltd.ncl.edu.tw/handle/34059819805318604766.
Pełny tekst źródła中國文化大學
資訊安全產業研發碩士專班
100
In recent years, cloud computing is not only a technical issue but also a popular commercial issue. It supplies services as well as resources through the Internet. Though cloud computing brings a lot of convenience, some people have doubt about its security. This study focuses on data and accounts protection on the cloud. We proposed security mechanisms to improve confidentiality, integrity, authentication, access control and audit in the cloud. The proposed security mechanisms are divided into two parts. The first part is for security of data storage, which combines the concept of RAID 5 with secret sharing. The second part is for account protection, which stores two time dimensions to make use of bitemporal databases. Before being uploaded, data are split using of the first part mechanisms. Even if someone steals some data, he couldn’t read and use them. The first part mechanisms will achieve confidentiality and integrity. When consumers perform some actions on cloud bitemporal databases, corresponding transaction times will be recorded and checked with their valid times. Thus we can audit consumers’ transactions. Herewith the second part mechanisms will achieve authentication, access control and auditing. Therefore, the security mechanisms can secure data and protect accounts.
Części książek na temat "DNA-based secure data storage"
Wang, Yuhua, Xin Tang, Yiteng Zhou, Xiguang Chen i Yudan Zhu. "Blockchain-Based Integrity Auditing with Secure Deduplication in Cloud Storage". W Data Mining and Big Data, 303–18. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-8991-9_21.
Pełny tekst źródłaZhang, Yuan, Xiaodong Lin i Chunxiang Xu. "Blockchain-Based Secure Data Provenance for Cloud Storage". W Information and Communications Security, 3–19. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01950-1_1.
Pełny tekst źródłaMoosavi, Sanaz Rahimi, i Arman Izadifar. "End-to-End Security Scheme for E-Health Systems Using DNA-Based ECC". W Silicon Valley Cybersecurity Conference, 77–89. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96057-5_6.
Pełny tekst źródłaDoss, Bandi, P. Balamuralikrishna, C. H. Nagaraju, Dayadi Lakshmaiah i S. Naresh. "Blockchain-Based Secure Big Data Storage on the Cloud". W Blockchain Technology for IoT and Wireless Communications, 11–18. Boca Raton: CRC Press, 2023. http://dx.doi.org/10.1201/9781003269991-2.
Pełny tekst źródłaZhang, Manchao, Hong Zhu i Kai Jiang. "Secure Cross-Domain Data Sharing Technology Based on Blockchain". W Security, Privacy, and Anonymity in Computation, Communication, and Storage, 27–38. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68884-4_3.
Pełny tekst źródłaRashmi, M., P. William, N. Yogeesh i D. K. Girija. "Blockchain-Based Cloud Storage Using Secure and Decentralised Solution". W Proceedings of International Conference on Data Analytics and Insights, ICDAI 2023, 269–79. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-3878-0_23.
Pełny tekst źródłaJing, Zhaoxing, Chunjie Cao, Longjuan Wang i Yulian Sang. "Secure Data Storage Scheme of Judicial System Based on Blockchain". W Communications in Computer and Information Science, 339–50. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-7242-3_22.
Pełny tekst źródłaYatribi, Anouar, Mostafa Belkasmi i Fouad Ayoub. "An Efficient and Secure Forward Error Correcting Scheme for DNA Data Storage". W Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2018), 226–37. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17065-3_23.
Pełny tekst źródłaZhou, Lan, Vijay Varadharajan i Michael Hitchens. "Cryptographic Role-Based Access Control for Secure Cloud Data Storage Systems". W Security, Privacy and Trust in Cloud Systems, 313–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38586-5_11.
Pełny tekst źródłaKanakamedala, Phaneendra, Abburi Akhil, Triveni Buska, Kandimalla Koteswara Rao i Mallela Sireesha. "Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud". W Advances in Intelligent Systems and Computing, 81–89. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7330-6_7.
Pełny tekst źródłaStreszczenia konferencji na temat "DNA-based secure data storage"
S, Sudersan, Sowmiya B, Abhijith V.S, Thangavel M i Varalakshmi P. "Enhanced DNA Cryptosystem for Secure Cloud Data Storage". W 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC). IEEE, 2021. http://dx.doi.org/10.1109/icsccc51823.2021.9478177.
Pełny tekst źródłaElmoselhy, A., i E. S. M. El-Alfy. "On DNA cryptography for secure data storage and transfer". W 3rd Smart Cities Symposium (SCS 2020). Institution of Engineering and Technology, 2021. http://dx.doi.org/10.1049/icp.2021.0900.
Pełny tekst źródłaElminaam, Diaa Salama Abd, Menna Allah Wafik Mousa i Mohamed Abd El Fattah. "Secure Data Storage in The Cloud by Using DNA and Chaos Cryptography". W 2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC). IEEE, 2022. http://dx.doi.org/10.1109/miucc55081.2022.9781704.
Pełny tekst źródłaZhou, Su, Wenjie Chen, Wentao Chang, Rongrong Li, Xiaoying Ye i Xiaoyue Li. "Secure Blockchain-based Storage for Electricity Marketing Data". W 2023 Panda Forum on Power and Energy (PandaFPE). IEEE, 2023. http://dx.doi.org/10.1109/pandafpe57779.2023.10141324.
Pełny tekst źródłaSaeed, Sameera Abubaker, Marghny Hassan Mohamed i Mamdouh Farouk Mohamed. "Secure Storage of Data on Devices-Android based". W 2021 International Conference on Software Engineering & Computer Systems and 4th International Conference on Computational Science and Information Management (ICSECS-ICOCSIM). IEEE, 2021. http://dx.doi.org/10.1109/icsecs52883.2021.00084.
Pełny tekst źródłaZhao, Li, Bo Zhang i Jiang Li. "Secure cloud storage system based on ciphertext retrieval". W 2020 International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE). IEEE, 2020. http://dx.doi.org/10.1109/icbaie49996.2020.00032.
Pełny tekst źródłaNadiya, Ulfah, Muhammad Ilham Rizqyawan i Oka Mahnedra. "Blockchain-based Secure Data Storage for Door Lock System". W 2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE). IEEE, 2019. http://dx.doi.org/10.1109/icitisee48480.2019.9003904.
Pełny tekst źródłaLin, Chu-Hsing, Sin-Ping Li, Yu-Chiao Lin i Chiao-Hsu Tsai. "Blockchain-based Secure Storage System for Medical Image Data". W 2023 IEEE 3rd International Conference on Electronic Communications, Internet of Things and Big Data (ICEIB). IEEE, 2023. http://dx.doi.org/10.1109/iceib57887.2023.10170051.
Pełny tekst źródłaGejibo, S. H., F. Mancini, K. A. Mughal, R. A. B. Valvik i J. Klungsoyr. "Secure data storage for Java ME-based mobile data collection systems". W 2012 IEEE 14th International Conference on e-Health Networking, Applications and Services (Healthcom 2012). IEEE, 2012. http://dx.doi.org/10.1109/healthcom.2012.6379471.
Pełny tekst źródłaLangheinrich, Marc. "FragDB - Secure Localized Storage Based on Super-Distributed RFID-Tag Infrastructures". W 2007 International Conference on Mobile Data Management. Conference and Custom Publishing, 2007. http://dx.doi.org/10.1109/mdm.2007.49.
Pełny tekst źródłaRaporty organizacyjne na temat "DNA-based secure data storage"
Koduru, Smitha. PR-244-193800-R01 Quantification of ILI Sizing for Severe Anomalies. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), czerwiec 2020. http://dx.doi.org/10.55274/r0011682.
Pełny tekst źródłaRodriguez Muxica, Natalia. Open configuration options Bioinformatics for Researchers in Life Sciences: Tools and Learning Resources. Inter-American Development Bank, luty 2022. http://dx.doi.org/10.18235/0003982.
Pełny tekst źródłaLichter, Amnon, Gopi K. Podila i Maria R. Davis. Identification of Genetic Determinants that Facilitate Development of B. cinerea at Low Temperature and its Postharvest Pathogenicity. United States Department of Agriculture, marzec 2011. http://dx.doi.org/10.32747/2011.7592641.bard.
Pełny tekst źródła