Results 61 to 70 of about 1,828 (182)
For security and efficiency problems in threshold based deduplication for cloud data,a novel method based on threshold re-encryption was proposed to deal with side channel attacks.A lightweight threshold re-encryption mechanism was presented to transfer ...
Xin TANG +3 more
doaj +2 more sources
SECURE DEDUP WITH ENCRYPTED DATA [PDF]
Cloud computing is one of the way of service provision over the internet today. Cloud computing is the developing a next level from the last decades. One of the drawbacks, cloud storage is a privacy security at the CSP. So, the chunks users stored by the
Anjali, G +3 more
core
The rapid expansion of the cloud service industry has raised the critical challenge of ensuring efficient job allocation and trust within a backdrop of heightened privacy concerns. Existing models often struggle to achieve an optimal balance between these factors, particularly in dynamic cloud environments.
Himani Saini +9 more
wiley +1 more source
Objective The aim of this systematic review is twofold: firstly, to identify the practice changes and interventions that have been adopted and implemented by community‐based health and social care organisations to ensure service continuity; and second, to explore high‐quality research‐driven recommendations regarding the development, implementation and
Farhana Haque Nila +4 more
wiley +1 more source
This PRISMA 2020–compliant systematic review examines how intelligent agents, large language models (LLMs), and recurrent neural networks (RNNs) can be combined for industrial maintenance, with a sector‐specific focus on mining. Scopus and Web of Science (2018–2025) were searched using replicable queries, and a dual text‐representation pipeline (TF–IDF
Luis Rojas +3 more
wiley +1 more source
Secure Data Deduplication in Cloud Storage Services [PDF]
Cloudová úložiště se poslední dobou stala výhodnou alternativou k jiným typům úložišť, jejich provozovatelé se však potýkají s problémem jak skloubit optimalizaci a ochranu uložených dat. Pro zajištění utajenosti svých dat by klienti úložiště preferovali
Staněk Jan
core
Efficacy of Digital Health Interventions Used for Adolescent's Sexual Health: An Umbrella Review
ABSTRACT Background and Aims Adolescents face many barriers and challenges associated with sexual and reproductive health (SRH). These barriers can include limited access to youth‐friendly healthcare services, lack of information, and stigma. Digital health interventions has the capability to enhance clinical management.
Sanam Borji‐Navan +2 more
wiley +1 more source
A survey analysis of quantum computing adoption and the paradigm of privacy engineering
Abstract This study investigates the adoption of quantum computing (QC) technology using the diffusion of innovation (DOI) theory and provides an extensive literature review. We deployed structural equation modeling to analyze data from a survey conducted among 96 top managers in various industries from Canada, the US, and Europe, including IT‐based ...
Nour Mousa, Farid Shirazi
wiley +1 more source
New method for file deduplication in cloud storage
Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting ...
Chao YANG +6 more
doaj +2 more sources
Abstract The frequent occurrence of severe convective weather has certain adverse effects on the smart agriculture industry. To enhance the prediction of severe convective weather, the inversion model effectively fills radar reflectivity data gaps by leveraging geostationary satellite data, offering more comprehensive and accurate support for ...
Zhengyong Jin +4 more
wiley +1 more source

