Results 221 to 230 of about 4,825 (248)
Some of the next articles are maybe not open access.

Secure Storage with Deduplication.

IACR Cryptol. ePrint Arch., 2022
John Best   +4 more
openaire   +1 more source

Secure Data Deduplication Schemes

2022
Sherman S. M. Chow, Yongjun Zhao
openaire   +1 more source

Achieving Efficient Secure Deduplication With User-Defined Access Control in Cloud

IEEE Transactions on Dependable and Secure Computing, 2022
Xue Yang, Rongxing Lu, Jun Shao
exaly  

Lightweight Secure Deduplication Based on Data Popularity

IEEE Systems Journal, 2023
Zhiqiang Wang, Wenjing Gao, Jia Yu
exaly  

Secure deduplication for big data with efficient dynamic ownership updates

Computers and Electrical Engineering, 2021
Rong Hao, Jia Yu, Pandi Vijayakumar
exaly  

Secure Deduplication Against Frequency Analysis Attacks

2022 18th International Conference on Mobility, Sensing and Networking (MSN), 2022
Hang Chen   +4 more
openaire   +1 more source

Secure deduplication schemes for content delivery in mobile edge computing

Computers and Security, 2022
Yunlong Mao, Sheng Zhong
exaly  

Payment-based incentive mechanism for secure cloud deduplication

International Journal of Information Management, 2015
Meixia Miao, Ilsun You
exaly  

Secure deduplication method based on tag clustering

2022 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), 2022
Fengkun Gao   +5 more
openaire   +1 more source

Home - About - Disclaimer - Privacy