Search

Your search keyword '"cloud storage"' showing total 6,290 results

Search Constraints

Start Over You searched for: Descriptor "cloud storage" Remove constraint Descriptor: "cloud storage" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed
6,290 results on '"cloud storage"'

Search Results

1. Dark Clouds on the Horizon? Effects of Cloud Storage on Security Breaches.

3. Cloud storage tier optimization through storage object classification.

4. Public Authentic-Replica Sampling Mechanism in Distributed Storage Environments.

5. Encrypted Data Reduction: Removing Redundancy from Encrypted Data in Outsourced Storage.

6. RESEARCH AND DESIGN OF INTELLIGENT PARKING MANAGEMENT SYSTEM BASED ON THE YOLO ALGORITHM.

7. A separable privacy-preserving technique based on reversible medical data hiding in plaintext encrypted images using neural network.

8. Artificial Intelligence Embedded Cloud Computing Technology for the Management of Digital Archives in the Fifth Industrial Revolution in South Africa.

9. Optimizing Storage Efficiency Through Pipelining and Parallelization for Enhanced Data Deduplication.

10. Modern cloud technology in choral vocal training: the use of cloud storage services.

11. Lightweight, verifiable and revocable EHRs sharing with fine-grained bilateral access control.

12. An encrypted deduplication scheme based on files diversity.

13. 基于坚果云盘数据共享与微信小程序的 校园信息发布平台设计与开发.

14. From Sensors to Standardized Financial Reports: A Proposed Automated Accounting System Integrating IoT, Blockchain, and XBRL.

15. Modelling a Request and Response-Based Cryptographic Model For Executing Data Deduplication in the Cloud.

16. Contextual attribute‐based access control scheme for cloud storage using blockchain technology.

17. Convergent encryption enabled secure data deduplication algorithm for cloud environment.

18. Challenges and Solutions for Sustainable ICT: The Role of File Storage.

19. SMedIR: secure medical image retrieval framework with ConvNeXt-based indexing and searchable encryption in the cloud.

20. Secure and efficient public auditing system of user data using hybrid AES-ECC crypto system with Merkle hash tree in blockchain.

21. Identity-based controlled delegated outsourcing data integrity auditing scheme.

22. A Robust Search Method Using Features To Determine Combined Keywords On Cloud Encrypted Data.

23. Building a local rare blood registry from scratch: A success story.

24. A Novel Method of Secured Data Distribution Using Sharding Zkp and Zero Trust Architecture in Blockchain Multi Cloud Environment.

25. Blockchain-assisted post-quantum privacy-preserving public auditing scheme to secure multimedia data in cloud storage.

26. A background-based new scheduling approach for scheduling the IoT network task with data storage in cloud environment.

27. Neural Network Reentry Guidance for Reusable Launch Vehicle Based on Sample Dimensionality Reduction.

28. Quorum and non-quorum based hierarchical multi-authority access control scheme for secure data sharing in cloud based environment.

29. Cloud Computing Security: Assured Deletion.

30. Blockchain-Based Secure Deduplication using Robust Systematic Cryptographic Methods.

31. 基于区块链的医疗数据共享系统.

32. Secured Framework with a Hash Function-Enabled Keyword Search in Cloud Storage Services.

33. Secure Deduplication Method with Blockchain-based Smart Contract for Heterogeneous Cloud Servers.

34. Strategy for Renewable Energy Consumption Based on Scenario Reduction and Flexible Resource Utilization.

35. A SECURE DATA STORAGE APPROACH FOR ONLINE EXAMINATION PLATFORM USING CLOUD DBAAS SERVICE.

36. SIMULATION OF SEGMENTED CLUSTERING OF CLOUD STORAGE DATA BASED ON NEURAL NETWORK MODELS AND PYTHON.

37. A blockchain-based auditable deduplication scheme for multi-cloud storage.

38. Obfuscating Ciphertext-Policy Attribute-Based Re-Encryption for Sensor Networks with Cloud Storage.

39. An Efficient Redundant Sparse Look-up Indexing Based File Deduplication Using Semantic Cluster Content Chunking for Optimizing Cloud Storage.

40. On the Model Update Strategies for Supervised Learning in AIOps Solutions.

41. Blockchain-based remote data integrity auditing scheme with deduplication mechanism.

42. A multi-objective approach for optimizing IoT applications offloading in fog–cloud environments with NSGA-II.

43. A deep learning-based surveillance system for enhancing public safety through internet of things and digital technology using Raspberry Pi.

44. Query recovery attacks against conjunctive keyword searchable encryption

45. A Structured Lightweight Encryption Architecture for Data Protection in IoT.

46. An integrated dataset of near-surface Eulerian fields and Lagrangian trajectories from an ocean model.

47. A novel three-factor authentication and optimal mapreduce frameworks for secure medical big data transmission over the cloud with shaxecc.

48. A smart hybrid content-defined chunking algorithm for data deduplication in cloud storage.

49. An effective hybrid attention capsule autoencoder model for diagnosing COVID-19 disease using chest CT scan images in an edge computing environment.

50. Weighted Attribute-Based Proxy Re-Encryption Scheme with Distributed Multi-Authority Attributes.

Catalog

Books, media, physical & digital resources