Artykuły w czasopismach na temat „Information storage and retrieval systems - security”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Information storage and retrieval systems - security”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Arunarani, Ar, i D. Manjula Perkinian. "Intelligent Techniques for Providing Effective Security to Cloud Databases". International Journal of Intelligent Information Technologies 14, nr 1 (styczeń 2018): 1–16. http://dx.doi.org/10.4018/ijiit.2018010101.
Pełny tekst źródłaKovalcik, Justin, i Mike Villalobos. "Automated Storage & Retrieval System". Information Technology and Libraries 38, nr 4 (16.12.2019): 114–24. http://dx.doi.org/10.6017/ital.v38i4.11273.
Pełny tekst źródłaBidve, Vijaykumar, Kiran Kakakde, Pakiriswamy Sarasu, Shailesh Kediya, Pradip Tamkhade i Suprakash Sudarsanan Nair. "Patient data management using blockchain technology". Indonesian Journal of Electrical Engineering and Computer Science 32, nr 3 (1.12.2023): 1746. http://dx.doi.org/10.11591/ijeecs.v32.i3.pp1746-1754.
Pełny tekst źródłaShojaei, Parisasadat, Elena Vlahu-Gjorgievska i Yang-Wai Chow. "Security and Privacy of Technologies in Health Information Systems: A Systematic Literature Review". Computers 13, nr 2 (31.01.2024): 41. http://dx.doi.org/10.3390/computers13020041.
Pełny tekst źródłaXie, Run, Chanlian He, Dongqing Xie, Chongzhi Gao i Xiaojun Zhang. "A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage". Security and Communication Networks 2018 (6.06.2018): 1–7. http://dx.doi.org/10.1155/2018/7254305.
Pełny tekst źródłaPing, Yuan, Wei Song, Zhili Zhang, Weiping Wang i Baocang Wang. "A Multi-Keyword Searchable Encryption Scheme Based on Probability Trapdoor over Encryption Cloud Data". Information 11, nr 8 (12.08.2020): 394. http://dx.doi.org/10.3390/info11080394.
Pełny tekst źródłaFolasole, Adetayo, Oluwasegun Solomon Adegboye, Oluwaseun Isaiah Ekuewa i Patience Emanre Eshua. "Security, Privacy Challenges and Available Countermeasures in Electronic Health Record Systems: A Review". European Journal of Electrical Engineering and Computer Science 7, nr 6 (13.11.2023): 27–33. http://dx.doi.org/10.24018/ejece.2023.7.6.561.
Pełny tekst źródłaZhang, Qiuyu, Minrui Fu, Yibo Huang i Zhenyu Zhao. "Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage". Security and Communication Networks 2022 (30.03.2022): 1–14. http://dx.doi.org/10.1155/2022/9045259.
Pełny tekst źródłaLi, Weijing, Zicheng Zhou, Wen Fan i Juan Gao. "Design of Data Sharing Platform Based on Blockchain and IPFS Technology". Wireless Communications and Mobile Computing 2022 (13.07.2022): 1–7. http://dx.doi.org/10.1155/2022/3937725.
Pełny tekst źródłaTaipalus, Toni, Hilkka Grahn, Hannu Turtiainen i Andrei Costin. "Utilizing Vector Database Management Systems in Cyber Security". European Conference on Cyber Warfare and Security 23, nr 1 (21.06.2024): 560–65. http://dx.doi.org/10.34190/eccws.23.1.2220.
Pełny tekst źródłaGatkal, Suyog, Vinayak Dhage, Dhanashree Kalekar i Sanket Ghadge. "Survey on Medical Data Storage Systems". International Journal of Soft Computing and Engineering 11, nr 1 (30.09.2021): 44–48. http://dx.doi.org/10.35940/ijsce.a3528.0911121.
Pełny tekst źródłaHamid, Yasir, Rameez Yousuf i Atif Chowhan. "Security in Health Information Management Records through Blockchain Technology". Journal of Information Security and Cybercrimes Research 6, nr 1 (30.06.2023): 24–39. http://dx.doi.org/10.26735/qbij3667.
Pełny tekst źródłaRashid, Mustafa Noori, Leith Hamid Abed i Waleed Kareem Awad. "Financial information security using hybrid encryption technique on multi-cloud architecture". Bulletin of Electrical Engineering and Informatics 11, nr 6 (1.12.2022): 3450–61. http://dx.doi.org/10.11591/eei.v11i6.3967.
Pełny tekst źródłaGupta, Daya Sagar, i G. P. Biswas. "Secure Computation on Cloud Storage". Journal of Cases on Information Technology 17, nr 3 (lipiec 2015): 22–29. http://dx.doi.org/10.4018/jcit.2015070103.
Pełny tekst źródłaZhou, Wenbo. "MSCFS-RP: A Colored-Petri-Net-Based Analysis Model for Master–Slave Cloud File Systems with Replication Pipelining". Electronics 13, nr 14 (19.07.2024): 2852. http://dx.doi.org/10.3390/electronics13142852.
Pełny tekst źródłaAlsudani, Mustafa Qahtan, Hassan Falah Fakhruldeen, Heba Abdul-Jaleel Al-Asady i Feryal Ibrahim Jabbar. "Storage and encryption file authentication for cloud-based data retrieval". Bulletin of Electrical Engineering and Informatics 11, nr 2 (1.04.2022): 1110–16. http://dx.doi.org/10.11591/eei.v11i2.3344.
Pełny tekst źródłaShyam, Shyam, Pankaj Kumar, Rajeev Shrivastava, Satyabrata Jena, Tushar Kumar Pandey i Ankita Nigam. "Innovations in Cyber Security Algorithms for Databases Enhancing Data Retrieval and Management". Journal of Cybersecurity and Information Management 13, nr 2 (2024): 191–98. http://dx.doi.org/10.54216/jcim.130215.
Pełny tekst źródłaAl-Mayali, Yahya Mahdi Hadi, i Zahraa Yahya Mahdi Al-Mayali. "Digitization, and Coding, with Optimizing, of Iraqi Personnel Home Addresses forward, minimizing Storage Space, and Processing time". BIO Web of Conferences 97 (2024): 00028. http://dx.doi.org/10.1051/bioconf/20249700028.
Pełny tekst źródłaMishari Abdullah, AL Ajery,, Thamari, Abdullah Ali, Al Malki, Faisal Hamed, Khormi, Ahmed Abdu i Al Farshan, Salem Mohammed. "THE EVOLUTION OF MEDICAL INFORMATION MANAGEMENT: PAST, PRESENT, AND FUTURE PERSPECTIVES". EPH - International Journal of Medical and Health Science 8, nr 2 (11.06.2022): 22–30. http://dx.doi.org/10.53555/eijmhs.v8i2.181.
Pełny tekst źródłaN. Mhawi, Doaa, Haider W. Oleiwi i Heba L. Al-Taie. "Generating Encrypted Document Index Structure Using Tree Browser". Journal of Techniques 5, nr 2 (26.06.2023): 114–22. http://dx.doi.org/10.51173/jt.v5i2.948.
Pełny tekst źródłaDing, Yong, Hui Xu, Yujue Wang, Fang Yuan i Hai Liang. "Secure Multi-Keyword Search and Access Control over Electronic Health Records in Wireless Body Area Networks". Security and Communication Networks 2021 (29.09.2021): 1–11. http://dx.doi.org/10.1155/2021/9520941.
Pełny tekst źródłaMaosa, Herbert, Karim Ouazzane i Viktor Sowinski-Mydlarz. "Real-Time Cyber Analytics Data Collection Framework". International Journal of Information Security and Privacy 16, nr 1 (1.01.2022): 1–10. http://dx.doi.org/10.4018/ijisp.311465.
Pełny tekst źródłaSantiañez, Reymon M., i Benedict M. Sollano. "Development and Evaluation of Local Area Network Based Archiving System". American Journal of Agricultural Science, Engineering and Technology 5, nr 2 (29.11.2021): 286–96. http://dx.doi.org/10.54536/ajaset.v5i2.107.
Pełny tekst źródłaBudati, Anil Kumar, Sridhar Reddy Vulapula, Syed Bilal Hussian Shah, Anas Al-Tirawi i Anil Carie. "Secure Multi-Level Privacy-Protection Scheme for Securing Private Data over 5G-Enabled Hybrid Cloud IoT Networks". Electronics 12, nr 7 (30.03.2023): 1638. http://dx.doi.org/10.3390/electronics12071638.
Pełny tekst źródłaLazim Lafta, Ali, i Ayad I. Abdulsada. "SMPP-CBIR: shorted and mixed aggregated image features for privacy-preserving content-based image retrieval". Bulletin of Electrical Engineering and Informatics 11, nr 5 (1.10.2022): 2930–37. http://dx.doi.org/10.11591/eei.v11i5.4323.
Pełny tekst źródłaDu, Haorui, Jianhua Chen, Fei Lin, Cong Peng i Debiao He. "A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing". Security and Communication Networks 2022 (15.10.2022): 1–15. http://dx.doi.org/10.1155/2022/2309834.
Pełny tekst źródłaAbida Khanam. ""Ensuring Security in Electronic Health Records: Implementing and Validating a Blockchain and IPFS Framework"". Journal of Electrical Systems 20, nr 7s (4.05.2024): 2356–68. http://dx.doi.org/10.52783/jes.3972.
Pełny tekst źródłaKumar Barai, Dilip, G. Sridevi, Syed Umar i MSR Prasad. "Information Base Security Threats and Challenges' in Information Forensic: A Survey". Indonesian Journal of Electrical Engineering and Computer Science 1, nr 2 (1.02.2016): 406. http://dx.doi.org/10.11591/ijeecs.v1.i2.pp406-410.
Pełny tekst źródłaMei, Zhuolin, Jing Yu, Jinzhou Huang, Bin Wu, Zhiqiang Zhao, Caicai Zhang, Jiaoli Shi, Xiancheng Wang i Zongda Wu. "Secure Cloud Storage and Retrieval of Personal Health Data From Smart Wearable Devices With Privacy-Preserving Techniques". International Journal of Web Services Research 20, nr 1 (5.10.2023): 1–18. http://dx.doi.org/10.4018/ijwsr.331388.
Pełny tekst źródłaD. Rajalakshmi, Et al. "HealthBlock: A Blockchain-IoT Fusion for Secure Healthcare Data Exchange". International Journal on Recent and Innovation Trends in Computing and Communication 11, nr 9 (5.11.2023): 2018–23. http://dx.doi.org/10.17762/ijritcc.v11i9.9199.
Pełny tekst źródłaJain, Paras, Sunita Dwivedi, Adel R. Alharbi, R. Sureshbabu, Devesh Pratap Singh, Sajjad Shaukat Jamal i Daniel Krah. "Blockchain-Enabled Smart Surveillance System with Artificial Intelligence". Wireless Communications and Mobile Computing 2022 (6.05.2022): 1–9. http://dx.doi.org/10.1155/2022/2792639.
Pełny tekst źródłaThigale, Satyam R. "Multiple Keyword Search in Cloud Data". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, nr 04 (9.04.2024): 1–5. http://dx.doi.org/10.55041/ijsrem30422.
Pełny tekst źródłaFATIEIEVA, Anastasiia. "Information systems in the enterprise's management". Economics. Finances. Law, nr 6/1 (26.06.2020): 11–15. http://dx.doi.org/10.37634/efp.2020.6(1).2.
Pełny tekst źródłaAl-Mukhtar, Wijdan Noaman Marzoog. "Enhancing Data Security in Cloud Computing: A Comparative Analysis of Encryption Techniques". International Journal on Recent and Innovation Trends in Computing and Communication 11, nr 11 (30.11.2023): 195–207. http://dx.doi.org/10.17762/ijritcc.v11i11.9306.
Pełny tekst źródłaGouveia Junior, Mário. "O pensamento de baumaniano e os paradigmas de mediação da informação". RDBCI: Revista Digital de Biblioteconomia e Ciência da Informação 13, nr 1 (30.01.2015): 156. http://dx.doi.org/10.20396/rdbci.v13i1.1586.
Pełny tekst źródłaJayathissa, Prabath, i Roshan Hewapathrana. "HAPI-FHIR Server Implementation to Enhancing Interoperability among Primary Care Health Information Systems in Sri Lanka: Review of the Technical Use Case". European Modern Studies Journal 7, nr 6 (1.02.2024): 225–41. http://dx.doi.org/10.59573/emsj.7(6).2023.23.
Pełny tekst źródłaYe, Xubo, i Mababa Jonilo. "Unleashing the Power of Big Data: Designing a Robust Business Intelligence Framework for E-commerce Data Analytics". Journal of Information Systems Engineering and Management 8, nr 3 (29.11.2023): 22638. http://dx.doi.org/10.55267/iadt.07.13946.
Pełny tekst źródłaKumar, Sarvesh, Mohammed Abdul Wajeed, Rajashekhar Kunabeva, Nripendra Dwivedi, Prateek Singhal, Sajjad Shaukat Jamal i Reynah Akwafo. "Novel Method for Safeguarding Personal Health Record in Cloud Connection Using Deep Learning Models". Computational Intelligence and Neuroscience 2022 (19.03.2022): 1–14. http://dx.doi.org/10.1155/2022/3564436.
Pełny tekst źródłaWang, Miye, Sheyu Li, Tao Zheng, Nan Li, Qingke Shi, Xuejun Zhuo, Renxin Ding i Yong Huang. "Big Data Health Care Platform With Multisource Heterogeneous Data Integration and Massive High-Dimensional Data Governance for Large Hospitals: Design, Development, and Application". JMIR Medical Informatics 10, nr 4 (13.04.2022): e36481. http://dx.doi.org/10.2196/36481.
Pełny tekst źródłaReddy, Vonteru Srikanth, i Kumar Debasis. "Statistical Review of Health Monitoring Models for Real-Time Hospital Scenarios". International Journal on Recent and Innovation Trends in Computing and Communication 11, nr 7s (13.07.2023): 465–81. http://dx.doi.org/10.17762/ijritcc.v11i7s.7025.
Pełny tekst źródłaRakhmawati, Rina, Elya Riska Dwi Wahyuni, Walda Khoiriyah, Titi Susanti i Dwi Noviana Purnamasari. "Open Journal System (OJS) As An Office Automation Model". Diplomatika: Jurnal Kearsipan Terapan 5, nr 1 (11.01.2023): 1. http://dx.doi.org/10.22146/diplomatika.68200.
Pełny tekst źródłaZhao, Meng, i Yong Ding. "Dual-Server Identity-Based Encryption with Authorized Equality Test for IoT Data in Clouds". Security and Communication Networks 2022 (11.10.2022): 1–12. http://dx.doi.org/10.1155/2022/4905763.
Pełny tekst źródłaChen, Zhenwei, Axin Wu, Yifei Li, Qixuan Xing i Shengling Geng. "Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing". Security and Communication Networks 2021 (20.01.2021): 1–11. http://dx.doi.org/10.1155/2021/6619689.
Pełny tekst źródłaShinkar, Sonali V., i Dolly Thankachan. "SCMBQA: Design of a Customised SCM-Aware Sidechaining Model for QoS Enhancement under Attack Scenarios". International Journal on Recent and Innovation Trends in Computing and Communication 10, nr 1s (10.12.2022): 200–212. http://dx.doi.org/10.17762/ijritcc.v10i1s.5824.
Pełny tekst źródłaBommala, Harikrishna, Sireesha Vikkurty, K. Ramesh Babu i Bhargavi Peddi Reddy. "Security Issues in Service Model of Fog Computing Environment". International Journal on Recent and Innovation Trends in Computing and Communication 11, nr 9s (31.08.2023): 88–92. http://dx.doi.org/10.17762/ijritcc.v11i9s.7400.
Pełny tekst źródłaSumahasan, S., i D. Rajyalakshmi. "An Optimized Node Level Lightweight Security Algorithm for Cloud Assisted-IoT". International Journal on Recent and Innovation Trends in Computing and Communication 11, nr 9s (31.08.2023): 78–87. http://dx.doi.org/10.17762/ijritcc.v11i9s.7399.
Pełny tekst źródłaAnokhina, T. Y., i T. N. Zaitseva. "AUDIOVISUAL RECORDS AS A SOCIOCULTURAL PHENOMENON: PROBLEMS OF CREATION, STORAGE AND DEVELOPMENT PROSPECTS". KAZAN SOCIALLY-HUMANITARIAN BULLETIN 11, nr 2 (luty 2020): 4–8. http://dx.doi.org/10.24153/2079-5912-2020-11-2-4-8.
Pełny tekst źródłaFu, Siyi, i Kaza Mojtahe. "Harr-NMF Feature Extraction for Multilevel Educational Technology Teaching Big Data System". Security and Communication Networks 2022 (18.05.2022): 1–12. http://dx.doi.org/10.1155/2022/3178763.
Pełny tekst źródłaZhang, Ping, Jinbo Li i Zhumu Fu. "Public Key Encryption with Equality Test in a Cloud Environment". Information 13, nr 6 (24.05.2022): 265. http://dx.doi.org/10.3390/info13060265.
Pełny tekst źródłaTseng, Yi-Fan, Zi-Yuan Liu, Jen-Chieh Hsu i Raylin Tso. "Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function". Security and Communication Networks 2021 (12.02.2021): 1–12. http://dx.doi.org/10.1155/2021/6678194.
Pełny tekst źródła