Results 51 to 60 of about 1,828 (182)

Implementation of Deduplication on Encrypted Big-data using Signcryption for cloud storage applications [PDF]

open access: yes, 2018
As Big Data Cloud storage servers are getting widespread the shortage of disc space within the cloud becomes a major concern. The elimination of duplicate or redundant data, particularly in computer data is named deduplication.
Archana, A   +2 more
core  

A Systematic Literature Review of Information Security Practices in Higher Education Contexts

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Information security in institutions of higher learning is a persistent challenge that requires immediate attention. The plethora of reported information security breaches in higher education institutions (HEIs) corroborates this. This study reviews 358 articles from reputable journals and databases, synthesized following the preferred reporting items ...
Keefa Bwiino   +4 more
wiley   +1 more source

Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage

open access: yesIEEE Access, 2018
At present, there is a considerable increase in the amount of data stored in storage services, along with dramatic evolution of networking techniques. In storage services with huge data, the storage servers may want to reduce the volume of stored data ...
Taek-Young Youn   +3 more
doaj   +1 more source

Mega, Digital Storage Lockers, and the DMCA: Will Innovation Be Stifled by Fears of Piracy? [PDF]

open access: yes, 2014
Kim Dotcom, founder of Megaupload Limited, has been in many news headlines over the past year. Megaupload—one of Dotcom’s many peer-to-peer sharing sites—was the center of controversy, as it allowed users to upload and share all sorts of files, including
Mirsaidi, Ali V
core   +1 more source

Towards Achieving Data Security with the Cloud Computing Adoption Framework [PDF]

open access: yes, 2015
Offering real-time data security for petabytes of data is important for Cloud Computing. A recent survey on cloud security states that the security of users’ data has the highest priority as well as concern.
Chang, V, Ramachandran, M
core   +1 more source

A Review of the Internet of Things (IoT) Landscape: Technologies, Applications, and Open Challenges

open access: yesJournal of Electrical and Computer Engineering, Volume 2026, Issue 1, 2026.
The Internet of Things (IoT) has emerged as a large‐scale ecosystem that integrates sensing, communication, and computation across diverse application domains. Its deployment spans smart homes, wearable devices, industrial automation, and smart cities, where heterogeneous devices are required to operate under strict performance, reliability, and ...
Sidna Jeddou   +5 more
wiley   +1 more source

Spatiotemporal Big Data Retrieval Method Based on GeoHash Algorithm and Multimode Composite Index

open access: yesModelling and Simulation in Engineering, Volume 2026, Issue 1, 2026.
With the increasing demand for multisource heterogeneous spatiotemporal data in applications such as smart cities and intelligent transportation, how to balance retrieval accuracy, multimodal adaptation, and high concurrency response has become a key issue.
Yanxin Wang, Federica Proietto
wiley   +1 more source

The Identification of Emerging Quantum Technologies in the Healthcare Sector: A Horizon Scanning Study

open access: yesFUTURES &FORESIGHT SCIENCE, Volume 7, Issue 3, December 2025.
ABSTRACT Quantum technologies, driven by principles of quantum mechanics like superposition and entanglement, have shown transformative potential in drug discovery, medical diagnosis, precision medicine, and other therapeutic interventions. However, the research on emerging quantum technologies at early to late stages of development for healthcare ...
Oshin Sharma   +4 more
wiley   +1 more source

StorjLedger: An Innovative Distributed Storage Ecosystem That Overcomes Blockchain Trade‐Offs Using Erasure‐Coded Sharding and Proof‐of‐Storage Consensus

open access: yesEngineering Reports, Volume 7, Issue 10, October 2025.
StorjLedger leverages erasure‐coded sharding and Proof‐of‐Storage to deliver nearly 1000 transactions per second with sub‐second latency, 98% data redundancy, and 76% lower storage costs, resolving the blockchain trilemma by harmonizing scalability, security, and decentralization.
Saha Reno, Koushik Roy
wiley   +1 more source

Maternal Sleep Disorders and Maternal and Birth Outcomes: A Retrospective US Claims‐Based Study

open access: yesBrain and Behavior, Volume 15, Issue 9, September 2025.
In a retrospective US claims‐based study of 93,767 American women with singleton pregnancies, 3.41% were found to have clinically diagnosed sleep disorders. These sleep disorders were significantly associated with higher odds of adverse maternal, fetal, and neonatal outcomes compared to women without sleep disorders, highlighting the importance of ...
Anayeli Herrera Morales   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy