Works matching DE "CLOUD storage security measures"
Results: 73
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security.
- Published in:
- Computers, Materials & Continua, 2025, v. 82, n. 2, p. 2637, doi. 10.32604/cmc.2025.058717
- By:
- Publication type:
- Article
Simplified Image Encryption Algorithm (SIEA) to enhance image security in cloud storage.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 22, p. 61313, doi. 10.1007/s11042-023-17969-0
- By:
- Publication type:
- Article
Enhanced-Longest Common Subsequence based novel steganography approach for cloud storage.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 5, p. 7779, doi. 10.1007/s11042-022-13615-3
- By:
- Publication type:
- Article
Thumbnail Secret Image Sharing in Cloud Storage.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 17, p. 3076, doi. 10.3390/math10173076
- By:
- Publication type:
- Article
An Information Dispersal Algorithm Based Technique for Backup of Data in Cloud Data Centers.
- Published in:
- International Review on Computers & Software, 2015, v. 10, n. 2, p. 144, doi. 10.15866/irecos.v10i2.5542
- By:
- Publication type:
- Article
An Efficient Framework for Enhancing User Authentication in Cloud Storage Using Digital Watermark.
- Published in:
- International Review on Computers & Software, 2015, v. 10, n. 2, p. 130, doi. 10.15866/irecos.v10i2.5236
- By:
- Publication type:
- Article
Dark Clouds on the Horizon? Effects of Cloud Storage on Security Breaches.
- Published in:
- Journal of Management Information Systems, 2024, v. 41, n. 1, p. 206, doi. 10.1080/07421222.2023.2301177
- By:
- Publication type:
- Article
Editorial Introduction.
- Published in:
- 2024
- By:
- Publication type:
- Editorial
A Secure Role-Based Cloud Storage System For Encrypted Patient-Centric Health Records.
- Published in:
- Computer Journal, 2016, v. 59, n. 11, p. 1593, doi. 10.1093/comjnl/bxw019
- By:
- Publication type:
- Article
Public auditing of log integrity for shared cloud storage systems via blockchain.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 7, p. 6249, doi. 10.1007/s11276-020-02373-5
- By:
- Publication type:
- Article
Welcome to the Web World.
- Published in:
- Journal of the Australian & New Zealand Institute of Insurance & Finance, 2015, v. 38, n. 3, p. 1
- By:
- Publication type:
- Article
Effective Quantum Key Distribution Using Modified Key Sifting Scheme for Cloud Storage Security.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2023, v. 16, n. 2, p. 536, doi. 10.22266/ijies2023.0430.44
- By:
- Publication type:
- Article
Batch Attribute-Based Encryption for Secure Clouds.
- Published in:
- Information (2078-2489), 2015, v. 6, n. 4, p. 704, doi. 10.3390/info6040704
- By:
- Publication type:
- Article
Cybersecurity Risks to Business and Legal Sectors.
- Published in:
- Business Law International, 2024, v. 25, n. 3, p. 251
- By:
- Publication type:
- Article
Develop a High Storage Cloud Platform that Provides Enhanced Security.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 3960
- By:
- Publication type:
- Article
Security Techniques in Cloud Computing for Cloud Data Storage.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 1, p. 622
- By:
- Publication type:
- Article
A Novel Approach using Multi Cloud for Securing Cloud Data.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 1, p. 399
- By:
- Publication type:
- Article
Privacy-Preserving Public Auditing for Secure Cloud Storage.
- Published in:
- International Journal of Knowledge Based Computer Systems, 2017, v. 5, n. 1, p. 8
- By:
- Publication type:
- Article
Attack detection and mitigation scheme through novel authentication model enabled optimized neural network in smart healthcare.
- Published in:
- Computer Methods in Biomechanics & Biomedical Engineering, 2023, v. 26, n. 1, p. 38, doi. 10.1080/10255842.2022.2045585
- By:
- Publication type:
- Article
Cloud security: literature survey.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2023, v. 13, n. 4, p. 4734, doi. 10.11591/ijece.v13i4.pp4734-4742
- By:
- Publication type:
- Article
Improved ciphertext-policy time using short elliptic curve Diffie-Hellman.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2023, v. 13, n. 4, p. 4547, doi. 10.11591/ijece.v13i4.pp4547-4556
- By:
- Publication type:
- Article
Enhanced cloud security model using QKDP (ECSM-QKDP) for advanced data security over cloud.
- Published in:
- Quantum Information Processing, 2022, v. 21, n. 3, p. 1, doi. 10.1007/s11128-022-03452-6
- By:
- Publication type:
- Article
SOA Based BB84 Protocol for Enhancing Quantum Key Distribution in Cloud Environment.
- Published in:
- Wireless Personal Communications, 2023, v. 130, n. 3, p. 1759, doi. 10.1007/s11277-023-10354-y
- By:
- Publication type:
- Article
QMLFD Based RSA Cryptosystem for Enhancing Data Security in Public Cloud Storage System.
- Published in:
- Wireless Personal Communications, 2022, v. 122, n. 1, p. 755, doi. 10.1007/s11277-021-08924-z
- By:
- Publication type:
- Article
Signature Verification and Bloom Hashing Technique for Efficient Cloud Data Storage.
- Published in:
- Wireless Personal Communications, 2018, v. 103, n. 4, p. 3079, doi. 10.1007/s11277-018-5995-8
- By:
- Publication type:
- Article
Secure Disintegration Protocol for Privacy Preserving Cloud Storage.
- Published in:
- Wireless Personal Communications, 2018, v. 103, n. 2, p. 1161, doi. 10.1007/s11277-018-5284-6
- By:
- Publication type:
- Article
Trapdoor Security Lattice-Based Public-Key Searchable Encryption with a Designated Cloud Server.
- Published in:
- Wireless Personal Communications, 2018, v. 100, n. 3, p. 907, doi. 10.1007/s11277-018-5357-6
- By:
- Publication type:
- Article
A Review of Assured Data Deletion Security Techniques in Cloud Storage.
- Published in:
- Iraqi Journal of Science, 2023, v. 64, n. 5, p. 2492, doi. 10.24996/ijs.2023.64.5.33
- By:
- Publication type:
- Article
A Blockchain-Oriented Framework for Cloud-Assisted System to Countermeasure Phishing for Establishing Secure Smart City.
- Published in:
- Security & Communication Networks, 2023, v. 2023, p. 1, doi. 10.1155/2023/8168075
- By:
- Publication type:
- Article
A NEW TRUSTED AND COLLABORATIVE AGENT BASED APPROACH FOR ENSURING CLOUD SECURITY.
- Published in:
- Annals of the Faculty of Engineering Hunedoara - International Journal of Engineering, 2012, v. 10, n. 1, p. 71
- By:
- Publication type:
- Article
Online/Offline MA-CP-ABE with Cryptographic Reverse Firewalls for IoT.
- Published in:
- Entropy, 2023, v. 25, n. 4, p. 616, doi. 10.3390/e25040616
- By:
- Publication type:
- Article
PROTECTING THE INNOCENT--THE NEED TO ADAPT FEDERAL ASSET FORFEITURE LAWS TO PROTECT THE INTERESTS OF THIRD PARTIES IN DIGITAL ASSET SEIZURES.
- Published in:
- Cardozo Arts & Entertainment Law Journal, 2013, v. 32, n. 1, p. 283
- By:
- Publication type:
- Article
CryptoCT: towards privacy preserving color transfer and storage over cloud.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 18, p. 24223, doi. 10.1007/s11042-018-5729-7
- By:
- Publication type:
- Article
Secure cloud storage using anonymous and blackbox traceable data access control.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 4308, doi. 10.1002/sec.1343
- By:
- Publication type:
- Article
Achieving dynamic privileges in secure data sharing on cloud storage.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 2211, doi. 10.1002/sec.739
- By:
- Publication type:
- Article
A post-quantum provable data possession protocol in cloud.
- Published in:
- Security & Communication Networks, 2013, v. 6, n. 5, p. 658, doi. 10.1002/sec.691
- By:
- Publication type:
- Article
A STUDY OF SECURITY AND STORAGE OF DATA IN CLOUD COMPUTING ENVIRONMENT.
- Published in:
- International Journal of Advanced Research in Computer Science, 2024, v. 15, n. 6, p. 41, doi. 10.26483/ijarcs.v15i6.7162
- By:
- Publication type:
- Article
Investigation of Cloud Computing Security Issue.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 2117
- By:
- Publication type:
- Article
Authentication Scheme in Cloud Computing Environment.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 1114
- By:
- Publication type:
- Article
How About Ddos Attacks in Cloud Computing: A Survey.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 1073
- By:
- Publication type:
- Article
Survey on Data Security Issues in Cloud Computing.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 696
- By:
- Publication type:
- Article
Cloud Computing and its Emerging Need: Advantages and Issues.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 618
- By:
- Publication type:
- Article
SCLPV: Secure Certificate less Public Verification for Cloud-Based Cyber-Physical-Social Systems against Malevolent Auditors.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 552
- By:
- Publication type:
- Article
Assured Deletion: A Scheme Based on Strong Nonseparability.
- Published in:
- Journal of Sensors, 2022, p. 1, doi. 10.1155/2022/9691724
- By:
- Publication type:
- Article
Health Data Deduplication Using Window Chunking-Signature Encryption in Cloud.
- Published in:
- Intelligent Automation & Soft Computing, 2023, v. 36, n. 1, p. 1079, doi. 10.32604/iasc.2023.031283
- By:
- Publication type:
- Article
TAR-AFT: A Framework to Secure Shared Cloud Data with Group Management.
- Published in:
- Intelligent Automation & Soft Computing, 2022, v. 31, n. 3, p. 1809, doi. 10.32604/iasc.2022.018580
- By:
- Publication type:
- Article
Encrypted image classification based on multilayer extreme learning machine.
- Published in:
- Multidimensional Systems & Signal Processing, 2017, v. 28, n. 3, p. 851, doi. 10.1007/s11045-016-0408-1
- By:
- Publication type:
- Article
An innovative key agreement protocol with complex attribute authentication based on blockchain.
- Published in:
- Peer-to-Peer Networking & Applications, 2023, v. 16, n. 3, p. 1551, doi. 10.1007/s12083-023-01450-8
- By:
- Publication type:
- Article
Efficient data integrity auditing for storage security in mobile health cloud.
- Published in:
- Peer-to-Peer Networking & Applications, 2016, v. 9, n. 5, p. 854, doi. 10.1007/s12083-015-0346-y
- By:
- Publication type:
- Article
Lost in the Cloud: Cloud Storage, Privacy, and Suggestions for Protecting Users’ Data.
- Published in:
- Stanford Law Review, 2017, v. 69, n. 3, p. 867
- By:
- Publication type:
- Article