Search

Your search keyword '"Storage security"' showing total 351 results

Search Constraints

Start Over You searched for: Descriptor "Storage security" Remove constraint Descriptor: "Storage security"
351 results on '"Storage security"'

Search Results

51. Cloud Data Storage Security: The Challenges and a Countermeasure

52. A Comprehensive Study of the Past, Present, and Future of Data Deduplication.

53. A Scalable Data Integrity Mechanism Based on Provable Data Possession and JARs.

54. Trusted Validation for Geolocation of Cloud Data.

55. Low Complexity Secure P-Tensor Product Compressed Sensing Reconstruction Outsourcing and Identity Authentication in Cloud

56. HARE: A new Hash-based Authenticated Reliable and Efficient Modified Merkle Tree Data Structure to Ensure Integrity of Data in the Healthcare Systems

57. Impact of formation slope and fault on CO2 storage efficiency and containment at the Shenhua CO2 geological storage site in the Ordos Basin, China

58. Application of nuclear magnetic resonance technology to carbon capture, utilization and storage: A review

59. Secure data storage and intrusion detection in the cloud using MANN and dual encryption through various attacks

60. Cyclic CO2 – H2O injection and residual trapping: Implications for CO2 injection efficiency and storage security

61. PD-DM: An efficient locality-preserving block device mapper with plausible deniability

62. Research on Education Big Data Security Strategy under Network Environment

63. DOC-BLOCK: A Blockchain Based Authentication System for Digital Documents

64. Successful appraisal of the CarbonNet Pelican CO2 offshore storage site

65. Securing the Storage of Passwords Based on the MD5 HASH Transformation

66. Secure Search and Storage Services in Cloud and Fog/Edge Computing

67. Framework Towards Higher Data Privacy by Novel Data Integrity Scheme

68. The Role of Fractures in Geological CO2 Storage in Saline Aquifers

69. Solving the carbon-dioxide buoyancy challenge: The design and field testing of a dissolved CO2 injection system.

70. Dissolution Trapping - Convection Enhancement Limited by Geology.

71. Does Numerical Modelling of the Onset of Dissolution-convection Reliably Reproduce this Key Stabilization Process in CO2 Storage?

72. State-of-the-art Survey on Cloud Computing Security Challenges, Approaches and Solutions.

73. A Security Cloud Storage Scheme Based on Cipertext Policy Attribute-based Encryption.

74. University Education Resource Sharing Based on Blockchain and IPFS

75. Index Design of Electronic Medical Record Database Using Blockchain

76. Machine Learning Inspired Phishing Detection (PD) for Efficient Classification and Secure Storage Distribution (SSD) for Cloud-IoT Application

77. Research on Early Warning of Security Risk of Hazardous Chemicals Storage Based on BP-PSO

78. A Security and Privacy Focused KYC Data Sharing Platform

79. DISKSHIELD: A Data Tamper-Resistant Storage for Intel SGX

80. A Systematic Review of the Security in Cloud Computing: Data Integrity, Confidentiality and Availability

81. Security Systems Consideration: A Total Security Approach.

82. A hill cipher-based remote data possession checking in cloud storage.

83. Efficient Data Security Using Hybrid Cryptography on Cloud Computing

84. Deficiencies of Compliancy for Data and Storage

85. A Novel Authentication Approach Towards Secured Storage of Electronic Patient Record Using 3D Dynamic Order Template

86. Splitter: An Efficient Scheme to Determine the Geolocation of Cloud Data Publicly

87. Impact of CO2 mixing with trapped hydrocarbons on CO2 storage capacity and security: A case study from the Captain aquifer (North Sea)

88. Probabilistic Optimization of Incorporating Security Ciphers and Encryption of Data Storage in Cloud

89. Secure storage of Multi-level Classified Computer Data Based on the Combination of Differential Evolution Algorithm

90. DPVGeo: Delay-based Public Verification of Cloud Data Geolocation

91. Review of Blockchain Technology to Address Various Security Issues in Cloud Computing

92. Application of Blockchain Technology in Data Management of University Scientific Research

93. An extensive research survey on data integrity and deduplication towards privacy in cloud storage

94. Security in Computing and Communications

95. Secure Software Defined Networks Controller Storage using Intel Software Guard Extensions

96. Enhanced Cloud Data Storage Security by Using Hadoop

97. Communication and Cost Efficient Third Party Auditor Over Public Cloud

98. Multi-Authority-Based File Hierarchy Hidden CP-ABE Scheme for Cloud Security

99. Storage, security, and disposal

100. Secure Service Computing System Platform Based On Blockchain - A Systematic Literature Review

Catalog

Books, media, physical & digital resources