Results 31 to 40 of about 6,985 (236)

A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing [PDF]

open access: yes, 2016
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over ...
Kiraz, Mehmet Sabir
core   +1 more source

Compiling and securing cryptographic protocols [PDF]

open access: yes, 2009
Protocol narrations are widely used in security as semi-formal notations to specify conversations between roles. We define a translation from a protocol narration to the sequences of operations to be performed by each role.
Abadi   +12 more
core   +7 more sources

Low-complexity Multiclass Encryption by Compressed Sensing [PDF]

open access: yes, 2015
The idea that compressed sensing may be used to encrypt information from unauthorised receivers has already been envisioned, but never explored in depth since its security may seem compromised by the linearity of its encoding process.
Cambareri, Valerio   +4 more
core   +2 more sources

Basic concepts in quantum computation [PDF]

open access: yes, 2000
Section headings: 1 Qubits, gates and networks 2 Quantum arithmetic and function evaluations 3 Algorithms and their complexity 4 From interferometers to computers 5 The first quantum algorithms 6 Quantum search 7 Optimal phase estimation 8 Periodicity ...
A. Barenco   +40 more
core   +4 more sources

Roadmap on optical security [PDF]

open access: yes, 2016
Postprint (author's final ...
Javidi, Bahram   +2 more
core   +2 more sources

Wireless technology and clinical influences in healthcare setting: an Indian case study [PDF]

open access: yes, 2011
This chapter argues that current techniques used in the domain of Information Systems is not adequate for establishing determinants of wireless technology in a clinical setting.
Gururajan, Raj, Hafeez-Baig, Abdul
core   +2 more sources

PoSW:novel secure deduplication scheme for collaborative cloud applications

open access: yesTongxin xuebao, 2017
In order to solve the problems of secure access and deduplication to the shared file in the cloud environment,a novel notion called proof of shared ownership (PoSW) was formalized,and a formal definition of the PoSW was given.Furthermore,a PoSW scheme ...
Jin-bo XIONG   +5 more
doaj   +2 more sources

Data access control policy of encrypted deduplication system

open access: yesTongxin xuebao, 2020
To solve the problem that convergent encryption was commonly used in existing encrypted deduplication systems in cloud storage and data owner couldn’t effectively enforce access control on their outsourced data,an encrypted deduplication system was ...
Chunfu JIA, Guanxiong HA, Ruiqi LI
doaj   +2 more sources

CPDA: A Confidentiality-Preserving Deduplication Cloud Storage With Public Cloud Auditing

open access: yesIEEE Access, 2019
With growing popularity of cloud storage, the number of users of outsourcing data to cloud servers has increased dramatically. On the one hand, the rapidly increasing volume of data in the cloud is accompanied by a lot of data duplication.
Jiaojiao Wu   +3 more
doaj   +1 more source

Spatiotemporal and quantitative analyses of phosphoinositides – fluorescent probe—and mass spectrometry‐based approaches

open access: yesFEBS Letters, EarlyView.
Fluorescent probes allow dynamic visualization of phosphoinositides in living cells (left), whereas mass spectrometry provides high‐sensitivity, isomer‐resolved quantitation (right). Their synergistic use captures complementary aspects of lipid signaling. This review illustrates how these approaches reveal the spatiotemporal regulation and quantitative
Hiroaki Kajiho   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy