Статті в журналах з теми "CLOUD OF SECRECY"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "CLOUD OF SECRECY".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Gosavi, Mr Abhijeet, Mr Sakib Shaikh, Mr Adnan Sayyed, Mr Somesh Sapa, Mr Ayan Shaikh, and Prof A. A. Pund. "Enabling Encrypted Cloud Emails with Data Encryption using Advanced Encryption Techniques." International Journal for Research in Applied Science and Engineering Technology 11, no. 6 (June 30, 2023): 864–69. http://dx.doi.org/10.22214/ijraset.2023.53709.
Повний текст джерелаAnjaneyulu, GSGN, Yogendra Singh Sisodiya, and Kumar Saurav. "Novel Composite Encryption for Secrecy in Cloud Computing." Research Journal of Pharmacy and Technology 9, no. 9 (2016): 1501. http://dx.doi.org/10.5958/0974-360x.2016.00292.4.
Повний текст джерелаRajkumar, N., and E. Kannan. "Attribute-Based Collusion Resistance in Group-Based Cloud Data Sharing using LKH Model." Journal of Circuits, Systems and Computers 29, no. 02 (May 9, 2019): 2030001. http://dx.doi.org/10.1142/s0218126620300019.
Повний текст джерелаK, Sudha, and Dr Umarani C. "Security Framework for Cloud Information under Transparency of a Key." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 1429–36. http://dx.doi.org/10.22214/ijraset.2022.41550.
Повний текст джерелаPark, Junyoung, and Eui-Nam Huh. "eCLASS: Edge-Cloud-Log Assuring-Secrecy Scheme for Digital Forensics." Symmetry 11, no. 10 (September 22, 2019): 1192. http://dx.doi.org/10.3390/sym11101192.
Повний текст джерелаNagaraju, Dr Sabout, S. K. V. Jayakumar, and C. Swetha Priya. "Efficient Multi-linear Key Pairing Cryptosystem for Reliable Cloud-based Service Provisioning." Revista Gestão Inovação e Tecnologias 11, no. 4 (August 13, 2021): 4440–55. http://dx.doi.org/10.47059/revistageintec.v11i4.2471.
Повний текст джерелаKhan, Yunus, and Sunita Verma. "An Intelligent Blockchain and Software-Defined Networking-Based Evidence Collection Architecture for Cloud Environment." Scientific Programming 2021 (September 29, 2021): 1–19. http://dx.doi.org/10.1155/2021/7294206.
Повний текст джерелаAgarkhed, Jayashree, and R. Ashalatha. "Data Privacy and Security in Cloud Environment Using Cryptography Approach." Asian Journal of Computer Science and Technology 7, no. 1 (May 5, 2018): 50–54. http://dx.doi.org/10.51983/ajcst-2018.7.1.1830.
Повний текст джерелаQin, Bo, Huaqun Wang, Qianhong Wu, Jianwei Liu, and Josep Domingo-Ferrer. "Simultaneous authentication and secrecy in identity-based data upload to cloud." Cluster Computing 16, no. 4 (April 23, 2013): 845–59. http://dx.doi.org/10.1007/s10586-013-0258-7.
Повний текст джерелаSrilakshmi, K., and P. Bhargavi. "Cloud Computing Security Using Cryptographic Algorithms." Asian Journal of Computer Science and Technology 8, S3 (June 5, 2019): 76–80. http://dx.doi.org/10.51983/ajcst-2019.8.s3.2082.
Повний текст джерелаJanjua, Kanwal, Munam Ali Shah, Ahmad Almogren, Hasan Ali Khattak, Carsten Maple, and Ikram Ud Din. "Proactive Forensics in IoT: Privacy-Aware Log-Preservation Architecture in Fog-Enabled-Cloud Using Holochain and Containerization Technologies." Electronics 9, no. 7 (July 19, 2020): 1172. http://dx.doi.org/10.3390/electronics9071172.
Повний текст джерелаSahar Altaf, Muhammad Wajahat Ali, Muhammad Waqar Khan, Sumaira Yousuf Khan,. "A REVIEW OF THE SECURITY ISSUES IN CLOUD COMPUTING AND ITS REMEDIAL ACTION." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (March 2, 2021): 444–55. http://dx.doi.org/10.17762/itii.v9i1.150.
Повний текст джерелаIzang, A. A., Y. A. Mensah, O. J. Omotosho, and C. P. Obioma. "Overview of Cloud Computing and Recent Addendum." Journal of Communications Technology, Electronics and Computer Science 5 (May 10, 2016): 26. http://dx.doi.org/10.22385/jctecs.v5i0.93.
Повний текст джерелаKanashevskiy, V. A. "Legal problems of using cloud services of foreign providers by Russian banks." Lex Russica, no. 3 (April 5, 2019): 108–15. http://dx.doi.org/10.17803/1729-5920.2019.148.3.108-115.
Повний текст джерелаChiou, Shin-Yan. "A Secure Distributed Cloud Storage System Achieving Data Secrecy and Load Balance." International Journal of Security and Its Applications 11, no. 10 (October 31, 2017): 1–14. http://dx.doi.org/10.14257/ijsia.2017.11.10.01.
Повний текст джерелаKim, Byung Wook. "Secrecy Dimming Capacity in Multi-LED PAM-Based Visible Light Communications." Wireless Communications and Mobile Computing 2017 (2017): 1–6. http://dx.doi.org/10.1155/2017/4094096.
Повний текст джерелаNOMURA, Kenta, Masami MOHRI, Yoshiaki SHIRAISHI, and Masakatu MORII. "Attribute Revocable Multi-Authority Attribute-Based Encryption with Forward Secrecy for Cloud Storage." IEICE Transactions on Information and Systems E100.D, no. 10 (2017): 2420–31. http://dx.doi.org/10.1587/transinf.2016ofp0004.
Повний текст джерелаA., Mohan, and vamshikrishna P. "Accounting and Privacy Preserving of Data Owner in Cloud Storage." International Journal of Innovative Technology and Exploring Engineering 10, no. 6 (April 30, 2021): 14–17. http://dx.doi.org/10.35940/ijitee.f8715.0410621.
Повний текст джерелаChennam, Krishna Keerthi, and M. Akka Lakshmi. "Cloud Security in Crypt Database Server Using Fine Grained Access Control." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 3 (June 1, 2016): 915. http://dx.doi.org/10.11591/ijece.v6i3.8925.
Повний текст джерелаChennam, Krishna Keerthi, and M. Akka Lakshmi. "Cloud Security in Crypt Database Server Using Fine Grained Access Control." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 3 (June 1, 2016): 915. http://dx.doi.org/10.11591/ijece.v6i3.pp915-924.
Повний текст джерелаMuhammad Arslan Tariq, Muhammad Arslan Tariq. "Anomaly based Intrusion Detection System." International Journal for Electronic Crime Investigation 3, no. 3 (September 6, 2019): 7. http://dx.doi.org/10.54692/ijeci.2020.030341.
Повний текст джерелаMuhammad Arslan Tariq, Muhammad Arslan Tariq. "Anomaly based Intrusion Detection System." International Journal for Electronic Crime Investigation 3, no. 3 (September 6, 2019): 7. http://dx.doi.org/10.54692/ijeci.2020.030336.
Повний текст джерелаMuhammad Arslan Tariq, Muhammad Arslan Tariq. "Anomaly based Intrusion Detection System." International Journal for Electronic Crime Investigation 3, no. 3 (September 6, 2019): 7. http://dx.doi.org/10.54692/ijeci.2019.030341.
Повний текст джерелаMuhammad Arslan Tariq, Muhammad Arslan Tariq. "Anomaly based Intrusion Detection System." International Journal for Electronic Crime Investigation 3, no. 3 (September 6, 2019): 7. http://dx.doi.org/10.54692/ijeci.2019.030336.
Повний текст джерелаShi, Yanfeng, and Shuo Qiu. "Ciphertext-Policy Attribute-Based Encryption with Outsourced Set Intersection in Multimedia Cloud Computing." Electronics 10, no. 21 (November 3, 2021): 2685. http://dx.doi.org/10.3390/electronics10212685.
Повний текст джерелаN. Sarode, Snehal, and Geetha R. Chillarge. "Efficient and Secure Multi-Keyword Ranked Search and Group Data Sharing for Encrypted Cloud Data." Journal of Scientific Research 66, no. 02 (2022): 68–78. http://dx.doi.org/10.37398/jsr.2022.660210.
Повний текст джерелаKwofie, A., and A. A. Barik. "Cloud Security: Using Advance Encryption Standard Algorithm to Secure Cloud Data at Client Side and Taking Measures to Protect its Secrecy." International Journal of Advance Research and Innovation 8, no. 3 (2020): 11–14. http://dx.doi.org/10.51976/ijari.832003.
Повний текст джерелаKwao Dawson, John, Frimpong Twum, James Benjamin Hayfron Acquah, and Yaw Marfo Missah. "PRISMA Archetype-Based Systematic Literature Review of Security Algorithms in the Cloud." Security and Communication Networks 2023 (July 3, 2023): 1–17. http://dx.doi.org/10.1155/2023/9210803.
Повний текст джерелаKumariK, Anitha, Sudha Sadasivam G, and Madhumitha R. "Solution to Security and Secrecy in Cloud Environment using PAKE Protocol - A Bibliographic Survey." International Journal of Computer Applications 96, no. 2 (June 18, 2014): 26–36. http://dx.doi.org/10.5120/16767-6334.
Повний текст джерелаWang, Chenyu, Ke Ding, Bin Li, Yiming Zhao, Guoai Xu, Yanhui Guo, and Ping Wang. "An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment." Wireless Communications and Mobile Computing 2018 (October 1, 2018): 1–13. http://dx.doi.org/10.1155/2018/3048697.
Повний текст джерелаAl-Sayyed, Rizik M. H., Wadi’ A. Hijawi, Anwar M. Bashiti, Ibrahim AlJarah, Nadim Obeid, and Omar Y. A. Al-Adwan. "An Investigation of Microsoft Azure and Amazon Web Services from Users’ Perspectives." International Journal of Emerging Technologies in Learning (iJET) 14, no. 10 (May 30, 2019): 217. http://dx.doi.org/10.3991/ijet.v14i10.9902.
Повний текст джерелаWang, Feifei, Guosheng Xu, Guoai Xu, Yuejie Wang, and Junhao Peng. "A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure." Wireless Communications and Mobile Computing 2020 (February 18, 2020): 1–15. http://dx.doi.org/10.1155/2020/3805058.
Повний текст джерелаD, Ramesh, and Rama B. "Secure Privacy Implications for Clients and End-users through Key Assortment Crypto Techniques Implicated Algorithm." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (December 1, 2018): 5443. http://dx.doi.org/10.11591/ijece.v8i6.pp5443-5448.
Повний текст джерелаAbouljam, Sana Mohammed, and Tulika . "Cloud based secured privacy preserving protocol for vehicular DTNS." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 199. http://dx.doi.org/10.14419/ijet.v7i1.1.9455.
Повний текст джерелаRavichandran, S., and J. Sathiamoorthy. "An Innovative Performance of Refuge using Stowage Main Servers in Cloud Computing Equipment." Asian Journal of Computer Science and Technology 10, no. 1 (May 5, 2021): 13–17. http://dx.doi.org/10.51983/ajcst-2021.10.1.2695.
Повний текст джерелаLai, Jian-Foo, and Swee-Huay Heng. "Secure File Storage On Cloud Using Hybrid Cryptography." Journal of Informatics and Web Engineering 1, no. 2 (September 15, 2022): 1–18. http://dx.doi.org/10.33093/jiwe.2022.1.2.1.
Повний текст джерелаAlsaedi, Emad, and Alaa Kadhim. "A comparative study of combining deep learning and homomorphic encryption techniques." Al-Qadisiyah Journal Of Pure Science 27, no. 1 (March 13, 2022): 17–33. http://dx.doi.org/10.29350/qjps.2022.27.1.1452.
Повний текст джерелаZakria Mahrousa, Mahmoud Rahhal, Nairouz Alzin, Zakria Mahrousa, Mahmoud Rahhal, Nairouz Alzin. "Hybrid Secure Model for Securing Data in The Cloud Computing System by Combining RSA, AES and CP-ABE: نموذج هجين آمن لحماية البيانات في الحوسبة السحابية بدمج RSA وAES وCP-ABE". Journal of engineering sciences and information technology 5, № 4 (30 грудня 2021): 80–59. http://dx.doi.org/10.26389/ajsrp.z110521.
Повний текст джерелаCutugno, Matteo, Umberto Robustelli, and Giovanni Pugliano. "Structure-from-Motion 3D Reconstruction of the Historical Overpass Ponte della Cerra: A Comparison between MicMac® Open Source Software and Metashape®." Drones 6, no. 9 (September 6, 2022): 242. http://dx.doi.org/10.3390/drones6090242.
Повний текст джерелаYoun, Taek-Young, and Hyun Sook Rhee. "Secure Symmetric Keyword Search with Keyword Privacy for Cloud Storage Services." Security and Communication Networks 2021 (November 30, 2021): 1–8. http://dx.doi.org/10.1155/2021/2291470.
Повний текст джерелаSomaru, Navilla, and Christa Rautenbach. "Non-criminal dispute resolution in South Africa’s criminal justice system: Proposals for reform." South African Journal of Criminal Justice 33, no. 3 (2020): 646–69. http://dx.doi.org/10.47348/sacj/v33/i3a7.
Повний текст джерелаSastry, J. K. R., and M. Trinath Basu. "Securing multi-tenancy systems through multi DB instances and multiple databases on different physical servers." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 2 (April 1, 2019): 1385. http://dx.doi.org/10.11591/ijece.v9i2.pp1385-1392.
Повний текст джерелаHan, Linrui. "Personal Privacy Data Protection in Location Recommendation System." Journal of Physics: Conference Series 2138, no. 1 (December 1, 2021): 012026. http://dx.doi.org/10.1088/1742-6596/2138/1/012026.
Повний текст джерелаSai Ji, Sai Ji, Yang Yuan Sai Ji, Jian Shen Yang Yuan, Chin-Feng Lai Jian Shen, and Bofan Chen Chin-Feng Lai. "An Efficient Three-Party Authentication and Key Agreement Protocol for Privacy-Preserving of IoT Devices in Mobile Edge Computing." 網際網路技術學刊 23, no. 3 (May 2022): 437–48. http://dx.doi.org/10.53106/160792642022052303002.
Повний текст джерелаMeka, Likhita, and Srivyshnavi Pagadala. "Providing a Secure Cloud Storage by Using Attribute Based Temporary Key Word Search Scheme." Asian Journal of Computer Science and Technology 8, S3 (June 5, 2019): 117–21. http://dx.doi.org/10.51983/ajcst-2019.8.s3.2825.
Повний текст джерелаB, Aravind, Harikrishnan S, Santhosh G, Vijay J.E, and Saran Suaji T. "An Efficient Privacy - Aware Authentication Framework for Mobile Cloud Computing." International Academic Journal of Innovative Research 10, no. 1 (April 20, 2023): 1–7. http://dx.doi.org/10.9756/iajir/v10i1/iajir1001.
Повний текст джерелаMuhammad Umar Munir, Ghulam Abbas Khan, and Arslan Ammin. "Generic Framework Related to Database Forensics and Security Countermeasures." Journal of Computing & Biomedical Informatics 1, no. 01 (September 15, 2020): 15–30. http://dx.doi.org/10.56979/101/2020/42.
Повний текст джерелаMuhammad, Irfan, Hirley Alves, Onel Alcaraz López, and Matti Latva-aho. "Secure Rate Control and Statistical QoS Provisioning for Cloud-Based IoT Networks." Security and Communication Networks 2021 (October 29, 2021): 1–19. http://dx.doi.org/10.1155/2021/8650272.
Повний текст джерелаAlzuwaini, Mustafa, and Ali Yassin. "An Efficient Mechanism to Prevent the Phishing Attacks." Iraqi Journal for Electrical and Electronic Engineering 17, no. 1 (May 19, 2021): 1–11. http://dx.doi.org/10.37917/ijeee.17.1.15.
Повний текст джерелаJamjoom, Mona, Hussein Abulkasim, and Safia Abbas. "Lightweight Authenticated Privacy-Preserving Secure Framework for the Internet of Vehicles." Security and Communication Networks 2022 (September 9, 2022): 1–11. http://dx.doi.org/10.1155/2022/6573060.
Повний текст джерела