-
161
A Verifiable and Secure Industrial IoT Data Deduplication Scheme With Real-Time Data Integrity Checking in Fog-Assisted Cloud Environments
Published 2025-01-01Subjects: Get full text
Article -
162
Research progress of sensor-cloud security
Published 2018-03-01Subjects: “…cloud computing…”
Get full text
Article -
163
System Design for Media Server Based on Cloud Computing Technology and the Application Analysis
Published 2013-06-01Subjects: “…cloud computing…”
Get full text
Article -
164
Formal Description of Trusted Bebavior Oriented Security System for Big Data
Published 2014-07-01Subjects: Get full text
Article -
165
Network function outsourcing system based on prefix-preserving encryption
Published 2018-04-01Subjects: Get full text
Article -
166
Location-aware job scheduling for IoT systems using cloud and fog
Published 2025-01-01Subjects: Get full text
Article -
167
Design and implementation of OpenStack cloud platform for different storage modes
Published 2016-04-01Subjects: “…cloud computing…”
Get full text
Article -
168
Network Usage and Time Efficient Performance Enhancement Model for IoT Applications in Fog Cloud Computing
Published 2025-04-01Subjects: Get full text
Article -
169
Cloud Computing Resource Scheduling Algorithm Based on Unsampled Collaborative Knowledge Graph Network
Published 2024-01-01Subjects: Get full text
Article -
170
The impact of digital transformation on organizational structure and decision-making processes
Published 2024-01-01Subjects: Get full text
Article -
171
-
172
Multi-Smart Meter Data Encryption Scheme Basedon Distributed Differential Privacy
Published 2024-03-01Subjects: Get full text
Article -
173
Data outsourcing authentication model based on authenticated data structures for cloud computing
Published 2011-01-01Subjects: “…cloud computing…”
Get full text
Article -
174
Intellectual Property Protection for Graphical User Interfaces
Published 2024-06-01Subjects: Get full text
Article -
175
Bioinformatics services for analyzing massive genomic datasets
Published 2020-03-01Subjects: Get full text
Article -
176
Trust evaluation optimization mechanism for cloud user behavior based on FANP
Published 2022-04-01Subjects: “…cloud computing…”
Get full text
Article -
177
An improved Fully Homomorphic Encryption model based on N-Primes
Published 2019-10-01Subjects: “…Cloud Computing Security…”
Get full text
Article -
178
Trust-aware dynamic level scheduling algorithm in cloud environment
Published 2014-11-01Subjects: “…cloud computing…”
Get full text
Article -
179
Access control security model based on behavior in cloud computing environment
Published 2012-03-01Subjects: “…cloud computing…”
Get full text
Article -
180
On access to trusted virtual group under cloud computing
Published 2013-08-01Subjects: “…cloud computing…”
Get full text
Article