155   Artículos

« Anterior     Página: 1 de 8     Siguiente »

 
en línea
Mohan Naik Ramachandra, Madala Srinivasa Rao, Wen Cheng Lai, Bidare Divakarachari Parameshachari, Jayachandra Ananda Babu and Kivudujogappa Lingappa Hemalatha    
In recent decades, big data analysis has become the most important research topic. Hence, big data security offers Cloud application security and monitoring to host highly sensitive data to support Cloud platforms. However, the privacy and security of bi... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Ali Eghmazi, Mohammadhossein Ataei, René Jr Landry and Guy Chevrette    
The Internet of Things (IoT) is a technology that can connect billions of devices or ?things? to other devices (machine to machine) or even to people via an existing infrastructure. IoT applications in real-world scenarios include smart cities, smart hou... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Farid Lalem, Abdelkader Laouid, Mostefa Kara, Mohammed Al-Khalidi and Amna Eleyan    
Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Somchai Prakancharoen     Pág. pp. 136 - 151
The objective of this research was to suggest some simple solution to increase database manipulation security. Based on advantage of Homomorphic encryption, user?s data in database is always encrypted by Homomorphic encryption algorithm such as Paillier.... ver más

 
en línea
????????? ???????? ?????     Pág. 5 - 14
The subject matter of the study is the encryption of information in cloud data computation and storage. Cloud technologies enable reducing the cost of IT infrastructure significantly and responding to changes in computing needs flexibly. In this case, th... ver más

 
en línea
Tao Feng, Dewei Wang and Renbin Gong    
When choosing a third-party cloud storage platform, the confidentiality of data should be the primary concern. To address the issue of one-to-many access control during data sharing, it is important to encrypt data with an access policy that enables fine... ver más
Revista: Information    Formato: Electrónico

 
en línea
Mamoon Riaz, Hammad Dilpazir, Sundus Naseer, Hasan Mahmood, Asim Anwar, Junaid Khan, Ian B. Benitez and Tanveer Ahmad    
In the past few decades, the transmission of data over an unsecure channel has resulted in an increased rate of hacking. The requirement to make multimedia data more secure is increasing day by day. Numerous algorithms have been developed to improve effi... ver más
Revista: Information    Formato: Electrónico

 
en línea
Meijuan Huang, Yutian Liu, Bo Yang, Yanqi Zhao and Mingrui Zhang    
Revocable attribute-based encryption (RABE) provides greater flexibility and fine-grained access control for data sharing. However, the revocation process for most RABE schemes today is performed by the cloud storage provider (CSP). Since the CSP is an h... ver más
Revista: Information    Formato: Electrónico

 
en línea
Tse-Chuan Hsu    
With the rapid development of the Internet of Things (IoT) in recent years, many IoT devices use communication systems to transmit data. Data packets are inevitably at risk of tampering during data transmission, which can lead to information errors and d... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mira Lee and Minhye Seo    
Cloud storage services have become indispensable in resolving the constraints of local storage and ensuring data accessibility from anywhere at any time. Data deduplication technology is utilized to decrease storage space and bandwidth requirements. This... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Moatsum Alawida, Je Sen Teh and Wafa? Hamdan Alshoura    
Drone-based surveillance has become widespread due to its flexibility and ability to access hazardous areas, particularly in industrial complexes. As digital camera capabilities improve, more visual information can be stored in high-resolution images, re... ver más
Revista: Drones    Formato: Electrónico

 
en línea
Saci Medileh, Abdelkader Laouid, Mohammad Hammoudeh, Mostefa Kara, Tarek Bejaoui, Amna Eleyan and Mohammed Al-Khalidi    
In today?s hyperconnected world, the Internet of Things and Cloud Computing complement each other in several areas. Cloud Computing provides IoT systems with an efficient and flexible environment that supports application requirements such as real-time c... ver más
Revista: Information    Formato: Electrónico

 
en línea
Fatma S. Alrayes, Saud S. Alotaibi, Khalid A. Alissa, Mashael Maashi, Areej Alhogail, Najm Alotaibi, Heba Mohsen and Abdelwahed Motwakel    
Unmanned Aerial Vehicles (UAVs), or drones, provided with camera sensors enable improved situational awareness of several emergency responses and disaster management applications, as they can function from remote and complex accessing regions. The UAVs c... ver más
Revista: Drones    Formato: Electrónico

 
en línea
Ibrahim Abunadi, Hanan Abdullah Mengash, Saud S. Alotaibi, Mashael M. Asiri, Manar Ahmed Hamza, Abu Sarwar Zamani, Abdelwahed Motwakel and Ishfaq Yaseen    
Recent developments of semiconductor and communication technologies have resulted in the interconnection of numerous devices in offering seamless communication and services, which is termed as Internet of Everything (IoE). It is a subset of Internet of T... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Weijing You, Lei Lei, Bo Chen and Limin Liu    
By only storing a unique copy of duplicate data possessed by different data owners, deduplication can significantly reduce storage cost, and hence is used broadly in public clouds. When combining with confidentiality, deduplication will become problemati... ver más
Revista: Information    Formato: Electrónico

 
en línea
Siti Dhalila Mohd Satar, Masnida Hussin, Zurina Mohd Hanapi and Mohamad Afendee Mohamed    
Managing and controlling access to the tremendous data in Cloud storage is very challenging. Due to various entities engaged in the Cloud environment, there is a high possibility of data tampering. Cloud encryption is being employed to control data acces... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ibtisam A. Aljazaery,Haider Th. Salim Alrikabi,Mustafa Rabea Aziz     Pág. pp. 34 - 47
One of the techniques used in information security is the concealment technique, where the information to be hidden within another information medium to be saved in the process of messaging between two sides without detection. In this paper, an algorithm... ver más

 
en línea
Giao N. Pham, Son T. Ngo, Anh N. Bui, Dinh V. Tran, Suk-Hwan Lee and Ki-Ryong Kwon    
In recent years, GIS (Geographical Information System) vector maps are widely used in everyday life, science, and the military. However, the production process of vector maps is expensive, and a large volume of vector map data is easily stolen and illega... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
K.Ruben Raju,Danekula Rajya Lakshmi,Prof.Dr.G.Manoj Someswar    
The authors have plagiarized part of a paper that had already appeared in IEEE Transactions on Cloud Computing, 1?1. doi:10.1109/tcc.2016.2545668. One of the conditions of submission of a paper for publication is that authors declare explicitly that thei... ver más

 
en línea
Balaji Chandrasekaran,Ramadoss Balakrishnan,Yasuyuki Nogami     Pág. 75 - 81
Wireless Body Area Networks (WBANs) play an important role in healthcare system by enabling medical experts to guide patients without measuring face-to-face. The unauthorized access of medical data from WBAN controller as well as the unreliable data comm... ver más
Revista: Journal of Communications Software and Systems    Formato: Electrónico

« Anterior     Página: 1 de 8     Siguiente »