Artykuły w czasopismach na temat „DNA-based secure data storage”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „DNA-based secure data storage”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
P., Poonguzhali, Prajyot Dhanokar, M. K. Chaithanya i Mahesh U. Patil. "Secure Storage of Data on Android Based Devices". International Journal of Engineering and Technology 8, nr 3 (marzec 2016): 177–82. http://dx.doi.org/10.7763/ijet.2016.v6.880.
Pełny tekst źródłaP., Poonguzhali, Prajyot Dhanokar, M. K. Chaithanya i Mahesh U. Patil. "Secure Storage of Data on Android Based Devices". International Journal of Engineering and Technology 8, nr 3 (marzec 2016): 177–82. http://dx.doi.org/10.7763/ijet.2016.v8.880.
Pełny tekst źródłaChen, Kaikai, Jinbo Zhu, Filip Bošković i Ulrich F. Keyser. "Nanopore-Based DNA Hard Drives for Rewritable and Secure Data Storage". Nano Letters 20, nr 5 (30.03.2020): 3754–60. http://dx.doi.org/10.1021/acs.nanolett.0c00755.
Pełny tekst źródłaManimekalai, R., i M. Chandra Kumar Peter. "Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud". International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (30.06.2018): 252–54. http://dx.doi.org/10.31142/ijtsrd13014.
Pełny tekst źródłaS, Rajasekaran, Kalifulla Y, Murugesan S, Ezhilvendan M i Gunasekaran J. "Authentication Based Cloud Storage and Secure Data Forwarding". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, nr 1 (1.02.2013): 106–10. http://dx.doi.org/10.24297/ijct.v4i1b.3068.
Pełny tekst źródłaGo, Woong, i Jin Kwak. "Dual server-based secure data-storage system for cloud storage". International Journal of Engineering Systems Modelling and Simulation 6, nr 1/2 (2014): 86. http://dx.doi.org/10.1504/ijesms.2014.058428.
Pełny tekst źródłaChenchen Han, Chenchen Han, Gwang-Jun Kim Chenchen Han, Osama Alfarraj Gwang-Jun Kim, Amr Tolba Osama Alfarraj i Yongjun Ren Amr Tolba. "ZT-BDS: A Secure Blockchain-based Zero-trust Data Storage Scheme in 6G Edge IoT". 網際網路技術學刊 23, nr 2 (marzec 2022): 289–95. http://dx.doi.org/10.53106/160792642022032302009.
Pełny tekst źródłaYuliang Shi, Kun Zhang i Qingzhong Li. "Meta-data Driven Data Chunk Based Secure Data Storage for SaaS". International Journal of Digital Content Technology and its Applications 5, nr 1 (31.01.2011): 173–85. http://dx.doi.org/10.4156/jdcta.vol5.issue1.18.
Pełny tekst źródłaHsiao-Ying Lin i Wen-Guey Tzeng. "A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding". IEEE Transactions on Parallel and Distributed Systems 23, nr 6 (czerwiec 2012): 995–1003. http://dx.doi.org/10.1109/tpds.2011.252.
Pełny tekst źródłaJaved, Muhammad Umar, Mubariz Rehman, Nadeem Javaid, Abdulaziz Aldegheishem, Nabil Alrajeh i Muhammad Tahir. "Blockchain-Based Secure Data Storage for Distributed Vehicular Networks". Applied Sciences 10, nr 6 (16.03.2020): 2011. http://dx.doi.org/10.3390/app10062011.
Pełny tekst źródłaRamadevi, M., i D. Bulla Rao. "A Novel identity based secure distributed data storage scheme". IOSR Journal of Computer Engineering 16, nr 6 (2014): 53–59. http://dx.doi.org/10.9790/0661-16645359.
Pełny tekst źródłaGrosges, Thomas, i Dominique Barchiesi. "Toward nanoworld-based secure encryption for enduring data storage". Optics Letters 35, nr 14 (9.07.2010): 2421. http://dx.doi.org/10.1364/ol.35.002421.
Pełny tekst źródłaDwivedi, Sandhya, i Juhi Kanungo. "TSDT: TPA Based Secure Data Transmission of Cloud Data Storage System". IJARCCE 6, nr 6 (30.06.2017): 499–507. http://dx.doi.org/10.17148/ijarcce.2017.6688.
Pełny tekst źródłaFeng, Tao, Xusheng Wang, Chunyan Liu i Junli Fang. "Secure Data Collaborative Computing Scheme Based on Blockchain". Security and Communication Networks 2021 (13.01.2021): 1–9. http://dx.doi.org/10.1155/2021/6630291.
Pełny tekst źródłaBabu, K. R. Remesh, i K. P. Madhu. "Intelligent Secure Storage Mechanism for Big Data". Webology 18, Special Issue 01 (29.04.2021): 246–61. http://dx.doi.org/10.14704/web/v18si01/web18057.
Pełny tekst źródłaShaharkar, Bhushan B., i Darshan P. Pandit. "ML Based Authentication Scheme for Data Storage in Cloud Based IoT". International Journal of Engineering and Advanced Technology 11, nr 6 (30.08.2022): 123–27. http://dx.doi.org/10.35940/ijeat.f3767.0811622.
Pełny tekst źródłaSeethaRamulu, Banoth, H. Balaji i Bashetty Suman. "Attribute based Access Control Scheme in Cloud Storage System". International Journal of Engineering & Technology 7, nr 4.6 (25.09.2018): 33. http://dx.doi.org/10.14419/ijet.v7i4.6.20228.
Pełny tekst źródłaSaikeerthana, R., i A. Umamakeswari. "Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption". Indian Journal of Science and Technology 8, S9 (10.05.2015): 318. http://dx.doi.org/10.17485/ijst/2015/v8is9/65600.
Pełny tekst źródłaLi, Hongzhi, Dezhi Han i Mingdong Tang. "Logisticschain: A Blockchain-Based Secure Storage Scheme for Logistics Data". Mobile Information Systems 2021 (3.02.2021): 1–15. http://dx.doi.org/10.1155/2021/8840399.
Pełny tekst źródłaWang, Jin, Wencheng Chen, Lei Wang, R. Simon Sherratt, Osama Alfarraj i Amr Tolba. "Data Secure Storage Mechanism of Sensor Networks Based on Blockchain". Computers, Materials & Continua 65, nr 3 (2020): 2365–84. http://dx.doi.org/10.32604/cmc.2020.011567.
Pełny tekst źródłaYu, Yong, Yannan Li, Bo Yang, Willy Susilo, Guomin Yang i Jian Bai. "Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage". IEEE Transactions on Emerging Topics in Computing 8, nr 2 (1.04.2020): 377–90. http://dx.doi.org/10.1109/tetc.2017.2759329.
Pełny tekst źródłaCui, Hui, Robert H. Deng i Yingjiu Li. "Attribute-based cloud storage with secure provenance over encrypted data". Future Generation Computer Systems 79 (luty 2018): 461–72. http://dx.doi.org/10.1016/j.future.2017.10.010.
Pełny tekst źródłaLin, Siyu, i Hao Wu. "Bloom Filter-Based Secure Data Forwarding in Large-Scale Cyber-Physical Systems". Mathematical Problems in Engineering 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/150512.
Pełny tekst źródłaZhou, Bao, Junsan Zhao, Guoping Chen i Ying Yin. "Research on Secure Storage Technology of Spatiotemporal Big Data Based on Blockchain". Applied Sciences 13, nr 13 (6.07.2023): 7911. http://dx.doi.org/10.3390/app13137911.
Pełny tekst źródłaMathur, Neha, Shweta Sinha, Rajesh Kumar Tyagi i Nishtha Jatana. "Analysis of Secure Data Sharing Techniques Using Blockchain". Fusion: Practice and Applications 10, nr 2 (2023): 42–54. http://dx.doi.org/10.54216/fpa.100204.
Pełny tekst źródłaR, Rushyanthan. "Blockchain Based Secured Document Storage for Cloud". International Journal for Research in Applied Science and Engineering Technology 10, nr 8 (31.08.2022): 1979–86. http://dx.doi.org/10.22214/ijraset.2022.46528.
Pełny tekst źródłaInbaraj, X. Alphonse, i A. Seshagiri Rao. "Modified Secure Data Deduplication Computing in Cloud based Environment". Circulation in Computer Science 2, nr 7 (20.08.2017): 14–19. http://dx.doi.org/10.22632/ccs-2017-252-42.
Pełny tekst źródłaShrivastava, Gaurav, i Sachin Patel. "Secure Storage and Data Sharing Scheme Using Private Blockchain-Based HDFS Data Storage for Cloud Computing". International Journal of Computer Networks and Applications 10, nr 1 (1.01.2023): 28. http://dx.doi.org/10.22247/ijcna/2023/218509.
Pełny tekst źródłaGeetha, G., G. Surekha, P. Aditya Sharma i E. Uma Shankari. "Provide a secured automatic program algorithm for DNA sequence storage arrangement in cloud". International Journal of Engineering & Technology 7, nr 2.20 (18.04.2018): 10. http://dx.doi.org/10.14419/ijet.v7i2.20.11733.
Pełny tekst źródłaThangavel, M., i P. Varalakshmi. "Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud". Cluster Computing 21, nr 2 (22.11.2017): 1411–37. http://dx.doi.org/10.1007/s10586-017-1368-4.
Pełny tekst źródłaJohnson, Reena, i M. V. Bramhe. "A Technique for Secure Data Deduplication in Cloud Storage". International Journal of Advanced Research in Computer Science and Software Engineering 7, nr 12 (30.12.2017): 91. http://dx.doi.org/10.23956/ijarcsse.v7i12.513.
Pełny tekst źródłaLi, Jingyi. "Research on dynamic and secure storage of financial data based on cloud platform". Web Intelligence 19, nr 4 (20.01.2022): 263–74. http://dx.doi.org/10.3233/web-210472.
Pełny tekst źródłaRamesh, Dharavath, Rahul Mishra i Damodar Reddy Edla. "Secure Data Storage in Cloud: An e-Stream Cipher-Based Secure and Dynamic Updation Policy". Arabian Journal for Science and Engineering 42, nr 2 (2.12.2016): 873–83. http://dx.doi.org/10.1007/s13369-016-2357-2.
Pełny tekst źródłaPhale, Jayesh, Ass Prof Soni R. Ragho, Rushikesh Kale, Priya Yelakar i Priyanka Sul. "Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud". International Journal for Research in Applied Science and Engineering Technology 11, nr 5 (31.05.2023): 3749–53. http://dx.doi.org/10.22214/ijraset.2023.52497.
Pełny tekst źródłaPassricha, Vishal, Ashish Chopra i Shubhanshi Singhal. "Secure Deduplication Scheme for Cloud Encrypted Data". International Journal of Advanced Pervasive and Ubiquitous Computing 11, nr 2 (kwiecień 2019): 27–40. http://dx.doi.org/10.4018/ijapuc.2019040103.
Pełny tekst źródłaZhang, Zhuyun, i Yanjun Geng. "A Secure Cloud Storage Algorithm for University Financial Data Based on the Blockchain Technology". Mobile Information Systems 2022 (31.08.2022): 1–9. http://dx.doi.org/10.1155/2022/5030738.
Pełny tekst źródłaSong, Heqing, Jifei Li i Haoteng Li. "A Cloud Secure Storage Mechanism Based on Data Dispersion and Encryption". IEEE Access 9 (2021): 63745–51. http://dx.doi.org/10.1109/access.2021.3075340.
Pełny tekst źródłaRen, Yongjun, Yan Leng, Yaping Cheng i Jin Wang. "Secure data storage based on blockchain and coding in edge computing". Mathematical Biosciences and Engineering 16, nr 4 (2019): 1874–92. http://dx.doi.org/10.3934/mbe.2019091.
Pełny tekst źródłaCui, Hui, Robert H. Deng, Yingjiu Li i Guowei Wu. "Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud". IEEE Transactions on Big Data 5, nr 3 (1.09.2019): 330–42. http://dx.doi.org/10.1109/tbdata.2017.2656120.
Pełny tekst źródłaNagasri, Y., P. Deepika i P. Sandhya Priya. "Efficient and Secure Data Forwarding for Erasure code Based Cloud Storage". International Journal of Computer Trends and Technology 35, nr 2 (25.05.2016): 76–78. http://dx.doi.org/10.14445/22312803/ijctt-v35p113.
Pełny tekst źródłaKale, Rushikesh, Assi Prof Soni R. Ragho, Jayesh Phale, Priya Yelakar i Priyanka Sul. "Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud". International Journal for Research in Applied Science and Engineering Technology 11, nr 3 (31.03.2023): 1385–89. http://dx.doi.org/10.22214/ijraset.2023.49675.
Pełny tekst źródłaMule, Balakrishna Reddy, Rishi Raj Kumar, Gude Srinivasulu, Gaddam Ranga Uday Sudheer i Dr K. Bala. "Secure Data Storage Using Erasure-Coding in Cloud Environment". International Journal for Research in Applied Science and Engineering Technology 11, nr 5 (31.05.2023): 872–75. http://dx.doi.org/10.22214/ijraset.2023.51636.
Pełny tekst źródłaSivasankari, S., V. Lavanya, G. Saranya i S. Lavanya. "Attributes Based Storage System for Secure De-Duplication of Encrypt Data in Cloud". Journal of Computational and Theoretical Nanoscience 17, nr 4 (1.04.2020): 1937–42. http://dx.doi.org/10.1166/jctn.2020.8470.
Pełny tekst źródłaReddy, P. Radha Krishna, S. Sivaramaiah i U. Sesadri. "Secure Data Forwarding in Cloud Storage System by using UMIB Proxy". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, nr 8 (30.08.2013): 1905–12. http://dx.doi.org/10.24297/ijct.v10i8.1472.
Pełny tekst źródłaPajany M. i Zayaraz G. "A Robust Lightweight Data Security Model for Cloud Data Access and Storage". International Journal of Information Technology and Web Engineering 16, nr 3 (lipiec 2021): 39–53. http://dx.doi.org/10.4018/ijitwe.2021070103.
Pełny tekst źródłaAljumah, Abdullah, Tariq Ahamed Ahanger i Imdad Ullah. "Heterogeneous Blockchain-Based Secure Framework for UAV Data". Mathematics 11, nr 6 (10.03.2023): 1348. http://dx.doi.org/10.3390/math11061348.
Pełny tekst źródłaMasood, Raziqa, i Q. P. Rana. "Public Auditing for Secure Cloud Storage based on DHT". Journal of University of Shanghai for Science and Technology 23, nr 11 (6.11.2021): 86–98. http://dx.doi.org/10.51201/jusst/21/10853.
Pełny tekst źródłaA.R.Gadekar, Mr, Dr M.V.Sarode i Dr V.M.Thakare. "Cloud Based Secure Storage for Online Examination System". International Journal of Engineering & Technology 7, nr 3.8 (7.07.2018): 74. http://dx.doi.org/10.14419/ijet.v7i3.8.15224.
Pełny tekst źródłaGousteris, Solonas, Yoannis C. Stamatiou, Constantinos Halkiopoulos, Hera Antonopoulou i Nikos Kostopoulos. "Secure Distributed Cloud Storage based on the Blockchain Technology and Smart Contracts". Emerging Science Journal 7, nr 2 (14.02.2023): 469–79. http://dx.doi.org/10.28991/esj-2023-07-02-012.
Pełny tekst źródłaMarwan, Samiha Abdelrahman Mohammed, Ahmed Shawish i Khaled Nagaty. "Utilizing DNA Strands for Secured Data-Hiding with High Capacity". International Journal of Interactive Mobile Technologies (iJIM) 11, nr 2 (11.04.2017): 88. http://dx.doi.org/10.3991/ijim.v11i2.6565.
Pełny tekst źródła