-
561
Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud
Published 2021-07-01Subjects: “…cloud computing…”
Get full text
Article -
562
Bioinspired Blockchain Framework for Secure and Scalable Wireless Sensor Network Integration in Fog–Cloud Ecosystems
Published 2024-12-01Subjects: Get full text
Article -
563
THE OPPORTUNITY OF USING CLOUD-BASED COMPUTING IN NUMERICAL SIMULATIONS ON STRUCTURAL ANALYSIS - CASE STUDY
Published 2022-06-01Subjects: “…finite element method, cloud-based solver, Ansys, SolidWorsk, SimScale…”
Get full text
Article -
564
Investigation on the Applications of Ethernet VPN in Cloud Data Center Interconnection
Published 2012-08-01Subjects: Get full text
Article -
565
A New Asymmetric Fully Homomorphic Encryption Scheme for Cloud Banking Data
Published 2021-01-01Subjects: “…Fully Homomorphic Encryption, Cloud computing, Asymmetric Encryption, Large number, Banking security.…”
Get full text
Article -
566
Hybrid Henry Gas-Harris Hawks Comprehensive-Opposition Algorithm for Task Scheduling in Cloud Computing
Published 2025-01-01Subjects: “…Cloud computing…”
Get full text
Article -
567
Provable data possession scheme based on public verification and private verification
Published 2019-03-01Subjects: “…cloud storage…”
Get full text
Article -
568
LOD for Architectural Heritage: BIM Modeling for the Solimene Factory
Published 2019-06-01Subjects: Get full text
Article -
569
Dynamic fair allocation of multi-resources based on shared resource quantity
Published 2016-07-01Subjects: “…cloud computing…”
Get full text
Article -
570
Research on privacy preserving mechanism of attribute-based encryption cloud storage
Published 2016-07-01Subjects: “…cloud storage…”
Get full text
Article -
571
Leftover bandwidth-aware peer selection algorithm for inter-datacenter content distribution
Published 2013-07-01Subjects: “…content cloud…”
Get full text
Article -
572
An Axial-Oriented Dual-Layer Indexing Structure for Tunnel Point Clouds
Published 2025-01-01Subjects: “…point cloud…”
Get full text
Article -
573
Secure and verifiable multi-keyword searchable encryption scheme in cloud
Published 2021-04-01Subjects: “…cloud computing…”
Get full text
Article -
574
Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application
Published 2021-03-01Subjects: Get full text
Article -
575
Building end to end service guarantee system of IoT covering“terminal pipe and cloud” based on signaling big data
Published 2018-06-01Subjects: Get full text
Article -
576
Technical solution and application of 5G slicing private network based on cloud-network integration
Published 2022-07-01Subjects: Get full text
Article -
577
Research progress on cloud data assured deletion based on cryptography
Published 2016-08-01Subjects: “…cloud data security…”
Get full text
Article -
578
Design of a small-scale and failure-resistant IaaS cloud using OpenStack
Published 2025-01-01Subjects: Get full text
Article -
579
Overview of research on trusted attestation technology of cloud virtualization platform
Published 2021-12-01Subjects: “…cloud platform…”
Get full text
Article -
580
Attribute-based bilateral access control scheme for cloud storage
Published 2024-04-01Subjects: “…cloud storage…”
Get full text
Article