Results 61 to 70 of about 4,825 (248)
Implementation of Deduplication on Encrypted Big-data using Signcryption for cloud storage applications [PDF]
As Big Data Cloud storage servers are getting widespread the shortage of disc space within the cloud becomes a major concern. The elimination of duplicate or redundant data, particularly in computer data is named deduplication.
Archana, A +2 more
core
Landscape of Research on Accounting Scope 3 Emissions: A Review of Methodologies and Data
ABSTRACT Scope 3 emissions have been proposed as a critical metric for evaluating corporate carbon footprint, identifying emission sources, and developing mitigation solutions. Yet, widespread corporate reporting of Scope 3 emissions remains limited, highlighting a critical gap in both research and practice.
Zeyu Wang +3 more
wiley +1 more source
Fast and secure laptop backups with encrypted de-duplication [PDF]
Many people now store large quantities of personal and corporate data on laptops or home computers. These often have poor or intermittent connectivity, and are vulnerable to theft or hardware failure.
Anderson, Paul, Zhang, Le
core +1 more source
ABSTRACT Using online job advertisement data improves the timeliness and granularity depth of analysis in the labor market in domains not covered by official data. Specifically, its variation over time may be used as an anticipator of official employment variations.
Pietro Giorgio Lovaglio +1 more
wiley +1 more source
Coupling Secret Sharing with Decentralized Server-Aided Encryption in Encrypted Deduplication
Outsourcing storage to the cloud can save storage costs and is commonly used in businesses. It should fulfill two major goals: storage efficiency and data confidentiality.
Chuang Gan +7 more
doaj +1 more source
A Survey of Secure Data Deduplication
Now days due to advancement of storage technology and computer technology, larger fraction of data is being maintained in digitized form. The same data is stored over and over again, consuming unnecessary storage space on the disc. Deduplication is ideal for highly redundant operations like backup, which requires repeatedly coping and storing the same ...
Harshal Shah, Riddhi Movaliya
openaire +1 more source
Abstract Evidence regarding the prognosis of thyroid carcinoma is heterogeneous, ranging from age effects and nodal burden metrics, such as lymph node ratio (LNR) and log odds of positive nodes (LODDS), to preoperative imaging models comprising ultrasound, CEUS, and radiomics.
Mennatallah Sherif +2 more
wiley +1 more source
The Nexus Between Circular Economy and Sustainable Supply Chain Management: PRISMA Methodology
ABSTRACT The intersection of sustainable supply chain management (SSCM) and circular economy (CE) has attracted increasing academic and practical attention, emphasizing the need for integrated sustainability approaches. This study employs the PRISMA protocol and conceptualizes the CE–SSCM relationship as a dynamic system in which internal capabilities,
Feriel Barkaoui, Khaled Ben abdallah
wiley +1 more source
PoSW:novel secure deduplication scheme for collaborative cloud applications
In order to solve the problems of secure access and deduplication to the shared file in the cloud environment,a novel notion called proof of shared ownership (PoSW) was formalized,and a formal definition of the PoSW was given.Furthermore,a PoSW scheme ...
Jin-bo XIONG +5 more
doaj +2 more sources
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam +9 more
wiley +1 more source

