Results 81 to 90 of about 2,849,694 (325)
Ontology-Based Security Context Reasoning for Power IoT-Cloud Security Service
For a variety of cyber-attacks occurring in a power IoT-Cloud environment, conventional security intrusion incident detection and response technologies typically use pattern- and behavior-based statistical methods.
Chang Choi, Junho Choi
semanticscholar +1 more source
State of The Art and Hot Aspects in Cloud Data Storage Security [PDF]
Along with the evolution of cloud computing and cloud storage towards matu- rity, researchers have analyzed an increasing range of cloud computing security aspects, data security being an important topic in this area.
Gehrmann, Christian +2 more
core +3 more sources
Secret Sharing for Cloud Data Security
Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud ...
Attasena, Varunya +2 more
core +1 more source
Photonic Nanomaterials for Wearable Health Solutions
This review discusses the fundamentals and applications of photonic nanomaterials in wearable health technologies. It covers light‐matter interactions, synthesis, and functionalization strategies, device assembly, and sensing capabilities. Applications include skin patches and contact lenses for diagnostics and therapy. Future perspectives emphasize AI‐
Taewoong Park +3 more
wiley +1 more source
With the rapid development of information technology,cloud computing has become a hot topic.More and more companies and individuals will be their computing needs and storage needs to be delivered to the cloud,so the security problem of cloud computing ...
Ai-min YANG +3 more
doaj +2 more sources
eTPM: A Trusted Cloud Platform Enclave TPM Scheme Based on Intel SGX Technology
Today cloud computing is widely used in various industries. While benefiting from the services provided by the cloud, users are also faced with some security issues, such as information leakage and data tampering.
Haonan Sun +5 more
doaj +1 more source
Carbon‐based piezoelectric materials are systematically categorized based on their structural and functional properties. The mechanisms of stress‐induced charge transfer are elucidated, and their applications are explored across three key domains: piezoelectric catalysis for energy conversion and environmental remediation, piezoelectric biomedical ...
Mude Zhu +3 more
wiley +1 more source
Data Security and Privacy Protection for Cloud Storage: A Survey
The new development trends including Internet of Things (IoT), smart city, enterprises digital transformation and world’s digital economy are at the top of the tide.
Pan Yang, N. Xiong, Jingli Ren
semanticscholar +1 more source
Designing Physical Unclonable Functions From Optically Active Materials
Assigning unforgeable “fingerprints” to manufactured goods is a key strategy to fight global counterfeiting. Optical physical unclonable functions (PUFs) are chemically generated random patterns of optically active materials serving as unique authenticators.
Maxime Klausen +2 more
wiley +1 more source
Cloud security has been widely considered as the key factor restricting its development since the cloud computing technology emerged.The insecure factors of cloud computing system and the secure factors which cloud computing brings were presented and ...
Qunying Sun, Zhiyuan Hu
doaj +2 more sources

