Results 61 to 70 of about 1,828 (182)

Threshold re-encryption based secure deduplication method for cloud data with resistance against side channel attack

open access: yesTongxin xuebao, 2020
For security and efficiency problems in threshold based deduplication for cloud data,a novel method based on threshold re-encryption was proposed to deal with side channel attacks.A lightweight threshold re-encryption mechanism was presented to transfer ...
Xin TANG   +3 more
doaj   +2 more sources

SECURE DEDUP WITH ENCRYPTED DATA [PDF]

open access: yes, 2018
Cloud computing is one of the way of service provision over the internet today. Cloud computing is the developing a next level from the last decades. One of the drawbacks, cloud storage is a privacy security at the CSP. So, the chunks users stored by the
Anjali, G   +3 more
core  

Elevating Cloud Security With Advanced Trust Evaluation and Optimization of Hybrid Fireberg Technique

open access: yesIET Software, Volume 2025, Issue 1, 2025.
The rapid expansion of the cloud service industry has raised the critical challenge of ensuring efficient job allocation and trust within a backdrop of heightened privacy concerns. Existing models often struggle to achieve an optimal balance between these factors, particularly in dynamic cloud environments.
Himani Saini   +9 more
wiley   +1 more source

Service Continuity Support Initiatives of Community‐Based Healthcare and Social Care Organisations in Emergencies: A Systematic Review

open access: yesHealth &Social Care in the Community, Volume 2025, Issue 1, 2025.
Objective The aim of this systematic review is twofold: firstly, to identify the practice changes and interventions that have been adopted and implemented by community‐based health and social care organisations to ensure service continuity; and second, to explore high‐quality research‐driven recommendations regarding the development, implementation and
Farhana Haque Nila   +4 more
wiley   +1 more source

A Systematic Review of Intelligent Agents, Language Models, and Recurrent Neural Networks in Industrial Maintenance: Driving Value Creation for the Mining Sector

open access: yesInternational Journal of Intelligent Systems, Volume 2025, Issue 1, 2025.
This PRISMA 2020–compliant systematic review examines how intelligent agents, large language models (LLMs), and recurrent neural networks (RNNs) can be combined for industrial maintenance, with a sector‐specific focus on mining. Scopus and Web of Science (2018–2025) were searched using replicable queries, and a dual text‐representation pipeline (TF–IDF
Luis Rojas   +3 more
wiley   +1 more source

Secure Data Deduplication in Cloud Storage Services [PDF]

open access: yes
Cloudová úložiště se poslední dobou stala výhodnou alternativou k jiným typům úložišť, jejich provozovatelé se však potýkají s problémem jak skloubit optimalizaci a ochranu uložených dat. Pro zajištění utajenosti svých dat by klienti úložiště preferovali
Staněk Jan
core  

Efficacy of Digital Health Interventions Used for Adolescent's Sexual Health: An Umbrella Review

open access: yesHealth Science Reports, Volume 7, Issue 12, December 2024.
ABSTRACT Background and Aims Adolescents face many barriers and challenges associated with sexual and reproductive health (SRH). These barriers can include limited access to youth‐friendly healthcare services, lack of information, and stigma. Digital health interventions has the capability to enhance clinical management.
Sanam Borji‐Navan   +2 more
wiley   +1 more source

A survey analysis of quantum computing adoption and the paradigm of privacy engineering

open access: yesSECURITY AND PRIVACY, Volume 7, Issue 6, November/December 2024.
Abstract This study investigates the adoption of quantum computing (QC) technology using the diffusion of innovation (DOI) theory and provides an extensive literature review. We deployed structural equation modeling to analyze data from a survey conducted among 96 top managers in various industries from Canada, the US, and Europe, including IT‐based ...
Nour Mousa, Farid Shirazi
wiley   +1 more source

New method for file deduplication in cloud storage

open access: yesTongxin xuebao, 2017
Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting ...
Chao YANG   +6 more
doaj   +2 more sources

UReslham: Radar reflectivity inversion for smart agriculture with spatial federated learning over geostationary satellite observations

open access: yesComputational Intelligence, Volume 40, Issue 3, June 2024.
Abstract The frequent occurrence of severe convective weather has certain adverse effects on the smart agriculture industry. To enhance the prediction of severe convective weather, the inversion model effectively fills radar reflectivity data gaps by leveraging geostationary satellite data, offering more comprehensive and accurate support for ...
Zhengyong Jin   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy