-
21
Apply PSO into cloud storage task scheduling with QoS preference awareness
Published 2014-03-01Subjects: “…cloud storage…”
Get full text
Article -
22
Research and realization on USBKEY based network storage user data protection
Published 2018-06-01Subjects: Get full text
Article -
23
TCCL:secure and efficient development of desktop cloud structure
Published 2017-10-01Subjects: Get full text
Article -
24
Cloud Storage Data Protection Mechanism Based on a Fingerprint Cube Algorithm
Published 2014-11-01Subjects: “…cloud storage…”
Get full text
Article -
25
Survey of data possession provability proving on cloud storage
Published 2012-11-01Subjects: Get full text
Article -
26
Research on cloud storage systems supporting secure sharing
Published 2017-10-01Subjects: “…cloud storage…”
Get full text
Article -
27
Enhanced cloud storage access control scheme based on attribute
Published 2013-08-01Subjects: “…cloud storage…”
Get full text
Article -
28
Security sharing scheme for encrypted data in cloud storage
Published 2015-10-01Subjects: “…cloud storage…”
Get full text
Article -
29
CP-ABE based data access control for cloud storage
Published 2011-01-01Subjects: “…cloud storage…”
Get full text
Article -
30
Scheme of node identify authentication in distributed file interaction system
Published 2013-08-01Subjects: Get full text
Article -
31
Data update algorithm based on secure network coding in cloud environment
Published 2017-05-01Subjects: “…cloud storage…”
Get full text
Article -
32
Volume-hiding encrypted multi-map scheme based on hierarchical structure
Published 2024-01-01Subjects: “…cloud storage…”
Get full text
Article -
33
Cloud storage scheme based on closed-box encryption
Published 2017-07-01Subjects: “…cloud storage…”
Get full text
Article -
34
Query recovery attacks against conjunctive keyword searchable encryption
Published 2024-08-01Subjects: “…cloud storage…”
Get full text
Article -
35
ECMO: An Efficient and Confidential Outsourcing Protocol for Medical Data
Published 2025-01-01Subjects: Get full text
Article -
36
A comparative analysis of the health monitoring process using deep learning methods for brain tumour
Published 2025-02-01Subjects: Get full text
Article -
37
New construction of secure range query on encrypted data in cloud computing
Published 2015-02-01Subjects: “…cloud storage…”
Get full text
Article -
38
Secure data sharing scheme supporting efficient synchronous evolution for ciphertext and key
Published 2018-05-01Subjects: “…cloud storage…”
Get full text
Article -
39
A Project Designed by Cloud Storage Encryption Based on Separated Key
Published 2013-01-01Subjects: “…cloud storage…”
Get full text
Article -
40
An improved Fully Homomorphic Encryption model based on N-Primes
Published 2019-10-01Subjects: Get full text
Article