Showing 241 - 260 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 241
  2. 242
  3. 243
  4. 244
  5. 245
  6. 246

    Data security for internet plus in public cloud by Yongjian WANG, Aibo SONG, Yawei YE, Haibo JIANG

    Published 2017-10-01
    “…“Internet plus” has given birth to many new economic forms and business models,the public cloud faces a serious security challenges.The security of public cloud data was studied and the research ideas were put forward.Firstly,the concept of homomorphic encryption,the characteristics of additive homomorphic encryption and multiplicative homomorphic encryption,and the current research results and difficult problems to be solved were analyzed.Then,based on the multiplicative homomorphic encryption algorithm,hash table and similarity theory,a data security protection scheme was proposed,and the concrete realization process was described.The similarity and completeness of the encrypted data in the public cloud were tested by Euclidean distance.Finally,the correctness and security of the scheme were analyzed by theory.The simulation results verify the feasibility and validity of the scheme.…”
    Get full text
    Article
  7. 247
  8. 248
  9. 249
  10. 250
  11. 251
  12. 252
  13. 253
  14. 254
  15. 255

    Provable secure trusted protocol for network storage by DUAN Xin-dong, MA Jian-feng

    Published 2011-01-01
    Subjects: “…provable security…”
    Get full text
    Article
  16. 256
  17. 257
  18. 258
  19. 259

    Security analysis on a kind of group signatures by SI Tao-zhi1, WANG Ze-cheng1, LI Zhi-bin1, ZHOU Zhen-jiang1

    Published 2003-01-01
    “…In this paper, we show there are still some security leaks in these schemes, and give some methods of forgery attack.…”
    Get full text
    Article
  20. 260