Results 221 to 230 of about 4,825 (248)
Some of the next articles are maybe not open access.
Secure Storage with Deduplication.
IACR Cryptol. ePrint Arch., 2022John Best +4 more
openaire +1 more source
Achieving Efficient Secure Deduplication With User-Defined Access Control in Cloud
IEEE Transactions on Dependable and Secure Computing, 2022Xue Yang, Rongxing Lu, Jun Shao
exaly
Lightweight Secure Deduplication Based on Data Popularity
IEEE Systems Journal, 2023Zhiqiang Wang, Wenjing Gao, Jia Yu
exaly
Secure deduplication for big data with efficient dynamic ownership updates
Computers and Electrical Engineering, 2021Rong Hao, Jia Yu, Pandi Vijayakumar
exaly
Secure Deduplication Against Frequency Analysis Attacks
2022 18th International Conference on Mobility, Sensing and Networking (MSN), 2022Hang Chen +4 more
openaire +1 more source
Secure deduplication schemes for content delivery in mobile edge computing
Computers and Security, 2022Yunlong Mao, Sheng Zhong
exaly
Payment-based incentive mechanism for secure cloud deduplication
International Journal of Information Management, 2015Meixia Miao, Ilsun You
exaly
Secure deduplication method based on tag clustering
2022 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), 2022Fengkun Gao +5 more
openaire +1 more source

