Results 191 to 200 of about 4,825 (248)
A cross-dataset harmonized intrusion detection framework with statistically validated multi-model learning. [PDF]
Mishra S +3 more
europepmc +1 more source
Health Information Exchange: Contributions from 2023. [PDF]
Bloomrosen M, Feldman SS.
europepmc +1 more source
The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems. [PDF]
Gladis Kurian M, Chen Y.
europepmc +1 more source
A zero-shot prompt learning approach on fine-grained text classification. [PDF]
Zhang Z, Ge L, Hu R, Wang Y.
europepmc +1 more source
Research priorities for improved pandemic and epidemic intelligence.
Tornimbene B +24 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
FuzzyDedup: Secure Fuzzy Deduplication for Cloud Storage
IEEE Transactions on Dependable and Secure Computing, 2023Tao Jiang, Xu Yuan, Ke Cheng
exaly +2 more sources
Proceedings of the 14th ACM International Conference on Systems and Storage, 2021
Secure deduplication allows removing duplicate content at third-party storage services while preserving the privacy of users' data. However, current solutions are built with strict designs that cannot be adapted to storage service and applications with different security and performance requirements. We present S2Dedup, a trusted hardware-based privacy-
Mariana Miranda +3 more
openaire +2 more sources
Secure deduplication allows removing duplicate content at third-party storage services while preserving the privacy of users' data. However, current solutions are built with strict designs that cannot be adapted to storage service and applications with different security and performance requirements. We present S2Dedup, a trusted hardware-based privacy-
Mariana Miranda +3 more
openaire +2 more sources
Secure Deduplication Method Based on Autoencoder
2020 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), 2020Message lock encryption is the basis of current secure deduplication research. However, since the theoretical basis of randomized Message-locked encryption (R-MLE) is bilinear mapping, the computational overhead is large. Although this method has semantic security and supports data deduplication, it is not practical.
Hui Qi +3 more
openaire +1 more source

