Works matching DE "CLOUD storage security measures"
Results: 73
Signature Verification and Bloom Hashing Technique for Efficient Cloud Data Storage.
- Published in:
- Wireless Personal Communications, 2018, v. 103, n. 4, p. 3079, doi. 10.1007/s11277-018-5995-8
- By:
- Publication type:
- Article
Secure Disintegration Protocol for Privacy Preserving Cloud Storage.
- Published in:
- Wireless Personal Communications, 2018, v. 103, n. 2, p. 1161, doi. 10.1007/s11277-018-5284-6
- By:
- Publication type:
- Article
Trapdoor Security Lattice-Based Public-Key Searchable Encryption with a Designated Cloud Server.
- Published in:
- Wireless Personal Communications, 2018, v. 100, n. 3, p. 907, doi. 10.1007/s11277-018-5357-6
- By:
- Publication type:
- Article
Develop a High Storage Cloud Platform that Provides Enhanced Security.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 3960
- By:
- Publication type:
- Article
Security Techniques in Cloud Computing for Cloud Data Storage.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 1, p. 622
- By:
- Publication type:
- Article
A Novel Approach using Multi Cloud for Securing Cloud Data.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 1, p. 399
- By:
- Publication type:
- Article
The key security management scheme of cloud storage based on blockchain and digital twins.
- Published in:
- Journal of Cloud Computing (2192-113X), 2024, v. 13, n. 1, p. 1, doi. 10.1186/s13677-023-00587-4
- By:
- Publication type:
- Article
Improving cloud storage and privacy security for digital twin based medical records.
- Published in:
- Journal of Cloud Computing (2192-113X), 2023, v. 12, n. 1, p. 1, doi. 10.1186/s13677-023-00523-6
- By:
- Publication type:
- Article
Stochastic Gradient Descent long short-term memory based secure encryption algorithm for cloud data storage and retrieval in cloud computing environment.
- Published in:
- Journal of Cloud Computing (2192-113X), 2023, v. 12, n. 1, p. 1, doi. 10.1186/s13677-023-00442-6
- By:
- Publication type:
- Article
Cybersecurity Risks to Business and Legal Sectors.
- Published in:
- Business Law International, 2024, v. 25, n. 3, p. 251
- By:
- Publication type:
- Article
An Innovative Smart Home System with Cloud Integration.
- Published in:
- IUP Journal of Information Technology, 2024, v. 20, n. 3, p. 35
- By:
- Publication type:
- Article
A Virtual Cloud Storage Architecture for Enhanced Data Security.
- Published in:
- Computer Systems Science & Engineering, 2023, v. 44, n. 2, p. 1735, doi. 10.32604/csse.2023.025906
- By:
- Publication type:
- Article
Public auditing of log integrity for shared cloud storage systems via blockchain.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 7, p. 6249, doi. 10.1007/s11276-020-02373-5
- By:
- Publication type:
- Article
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security.
- Published in:
- Computers, Materials & Continua, 2025, v. 82, n. 2, p. 2637, doi. 10.32604/cmc.2025.058717
- By:
- Publication type:
- Article
PROTECTING THE INNOCENT--THE NEED TO ADAPT FEDERAL ASSET FORFEITURE LAWS TO PROTECT THE INTERESTS OF THIRD PARTIES IN DIGITAL ASSET SEIZURES.
- Published in:
- Cardozo Arts & Entertainment Law Journal, 2013, v. 32, n. 1, p. 283
- By:
- Publication type:
- Article
SOA Based BB84 Protocol for Enhancing Quantum Key Distribution in Cloud Environment.
- Published in:
- Wireless Personal Communications, 2023, v. 130, n. 3, p. 1759, doi. 10.1007/s11277-023-10354-y
- By:
- Publication type:
- Article
QMLFD Based RSA Cryptosystem for Enhancing Data Security in Public Cloud Storage System.
- Published in:
- Wireless Personal Communications, 2022, v. 122, n. 1, p. 755, doi. 10.1007/s11277-021-08924-z
- By:
- Publication type:
- Article
A Blockchain-Oriented Framework for Cloud-Assisted System to Countermeasure Phishing for Establishing Secure Smart City.
- Published in:
- Security & Communication Networks, 2023, v. 2023, p. 1, doi. 10.1155/2023/8168075
- By:
- Publication type:
- Article
Batch Attribute-Based Encryption for Secure Clouds.
- Published in:
- Information (2078-2489), 2015, v. 6, n. 4, p. 704, doi. 10.3390/info6040704
- By:
- Publication type:
- Article
Health Data Deduplication Using Window Chunking-Signature Encryption in Cloud.
- Published in:
- Intelligent Automation & Soft Computing, 2023, v. 36, n. 1, p. 1079, doi. 10.32604/iasc.2023.031283
- By:
- Publication type:
- Article
TAR-AFT: A Framework to Secure Shared Cloud Data with Group Management.
- Published in:
- Intelligent Automation & Soft Computing, 2022, v. 31, n. 3, p. 1809, doi. 10.32604/iasc.2022.018580
- By:
- Publication type:
- Article
A CLOUDY FORECAST: DIVERGENCE IN THE CLOUD COMPUTING LAWS OF THE UNITED STATES, EUROPEAN UNION, AND CHINA.
- Published in:
- Georgia Journal of International & Comparative Law, 2013, v. 41, n. 2, p. 481
- By:
- Publication type:
- Article
A Review of Assured Data Deletion Security Techniques in Cloud Storage.
- Published in:
- Iraqi Journal of Science, 2023, v. 64, n. 5, p. 2492, doi. 10.24996/ijs.2023.64.5.33
- By:
- Publication type:
- Article
Privacy-Preserving Public Auditing for Secure Cloud Storage.
- Published in:
- International Journal of Knowledge Based Computer Systems, 2017, v. 5, n. 1, p. 8
- By:
- Publication type:
- Article
Thumbnail Secret Image Sharing in Cloud Storage.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 17, p. 3076, doi. 10.3390/math10173076
- By:
- Publication type:
- Article
Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments.
- Published in:
- International Journal of Information Security, 2015, v. 14, n. 4, p. 299, doi. 10.1007/s10207-014-0255-8
- By:
- Publication type:
- Article
STUDY OF E-COMMERCE SECURITY OF INFORMATION IN CLOUD STORAGE USING AN ALGORITHM.
- Published in:
- Pranjana: The Journal of Management Awareness, 2023, v. 26, n. 1/2, p. 81, doi. 10.5958/0974-0945.2023.00008.7
- By:
- Publication type:
- Article
Editorial.
- Published in:
- Pranjana: The Journal of Management Awareness, 2023, v. 26, n. 1/2, p. 2
- By:
- Publication type:
- Article
Online/Offline MA-CP-ABE with Cryptographic Reverse Firewalls for IoT.
- Published in:
- Entropy, 2023, v. 25, n. 4, p. 616, doi. 10.3390/e25040616
- By:
- Publication type:
- Article
Enhanced cloud security model using QKDP (ECSM-QKDP) for advanced data security over cloud.
- Published in:
- Quantum Information Processing, 2022, v. 21, n. 3, p. 1, doi. 10.1007/s11128-022-03452-6
- By:
- Publication type:
- Article
An IBE-based design for assured deletion in cloud storage.
- Published in:
- Cryptologia, 2019, v. 43, n. 3, p. 254, doi. 10.1080/01611194.2018.1549123
- By:
- Publication type:
- Article
Bringing Enterprise Security Home.
- Published in:
- ISACA Journal, 2022, n. 2, p. 15
- By:
- Publication type:
- Article
Thumbnail-Preserving Encryption Technology Based on Digital Processing.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 14, p. 2682, doi. 10.3390/electronics13142682
- By:
- Publication type:
- Article
Design of Regenerating Code Based on Security Level in Cloud Storage System.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 11, p. 2423, doi. 10.3390/electronics12112423
- By:
- Publication type:
- Article
An Effective Model of Confidentiality Management of Digital Archives in a Cloud Environment.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 18, p. N.PAG, doi. 10.3390/electronics11182831
- By:
- Publication type:
- Article
Cloud security: literature survey.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2023, v. 13, n. 4, p. 4734, doi. 10.11591/ijece.v13i4.pp4734-4742
- By:
- Publication type:
- Article
Improved ciphertext-policy time using short elliptic curve Diffie-Hellman.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2023, v. 13, n. 4, p. 4547, doi. 10.11591/ijece.v13i4.pp4547-4556
- By:
- Publication type:
- Article
Body-Worn Cameras and the Cloud: The Costs of Getting it Wrong.
- Published in:
- Journal of Physical Security, 2022, v. 15, n. 1, p. 30
- By:
- Publication type:
- Article
An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services.
- Published in:
- Nonlinear Dynamics, 2015, v. 80, n. 3, p. 1601, doi. 10.1007/s11071-015-1965-9
- By:
- Publication type:
- Article
Research on security mechanism of cloud storage platform for remote sensing image.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 12, p. 3714, doi. 10.3969/j.issn.1001-3695.2014.12.050
- By:
- Publication type:
- Article
A Secure Role-Based Cloud Storage System For Encrypted Patient-Centric Health Records.
- Published in:
- Computer Journal, 2016, v. 59, n. 11, p. 1593, doi. 10.1093/comjnl/bxw019
- By:
- Publication type:
- Article
An innovative key agreement protocol with complex attribute authentication based on blockchain.
- Published in:
- Peer-to-Peer Networking & Applications, 2023, v. 16, n. 3, p. 1551, doi. 10.1007/s12083-023-01450-8
- By:
- Publication type:
- Article
Efficient data integrity auditing for storage security in mobile health cloud.
- Published in:
- Peer-to-Peer Networking & Applications, 2016, v. 9, n. 5, p. 854, doi. 10.1007/s12083-015-0346-y
- By:
- Publication type:
- Article
Obfuscatable multi-recipient re-encryption for secure privacy-preserving personal health record services.
- Published in:
- Technology & Health Care, 2015, v. 23, p. S139, doi. 10.3233/THC-150946
- By:
- Publication type:
- Article
Mapping the European Legal Framework on Security Requirements for Cloud Computing Infrastructures in the Healthcare Sector.
- Published in:
- European Data Protection Law Review (EDPL), 2020, v. 6, n. 4, p. 536, doi. 10.21552/edpl/2020/4/9
- By:
- Publication type:
- Article
Dark Clouds on the Horizon? Effects of Cloud Storage on Security Breaches.
- Published in:
- Journal of Management Information Systems, 2024, v. 41, n. 1, p. 206, doi. 10.1080/07421222.2023.2301177
- By:
- Publication type:
- Article
Editorial Introduction.
- Published in:
- 2024
- By:
- Publication type:
- Editorial
A STUDY OF SECURITY AND STORAGE OF DATA IN CLOUD COMPUTING ENVIRONMENT.
- Published in:
- International Journal of Advanced Research in Computer Science, 2024, v. 15, n. 6, p. 41, doi. 10.26483/ijarcs.v15i6.7162
- By:
- Publication type:
- Article
Investigation of Cloud Computing Security Issue.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 2117
- By:
- Publication type:
- Article
Authentication Scheme in Cloud Computing Environment.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 1114
- By:
- Publication type:
- Article