15   Artículos

 
en línea
Tao Feng, Dewei Wang and Renbin Gong    
When choosing a third-party cloud storage platform, the confidentiality of data should be the primary concern. To address the issue of one-to-many access control during data sharing, it is important to encrypt data with an access policy that enables fine... ver más
Revista: Information    Formato: Electrónico

 
en línea
Yarajarla Nagasree, Chiramdasu Rupa, Ponugumati Akshitha, Gautam Srivastava, Thippa Reddy Gadekallu and Kuruva Lakshmanna    
Privacy preservation of image data has been a top priority for many applications. The rapid growth of technology has increased the possibility of creating fake images using social media as a platform. However, many people, including researchers, rely on ... ver más
Revista: Drones    Formato: Electrónico

 
en línea
Beibei Song, Dehua Zhou, Jiahe Wu, Xiaowei Yuan, Yiming Zhu and Chuansheng Wang    
With the prevalence of cloud computing, the outsourcing of computation has gained significant attention. Clients with limited computing power often outsource complex computing tasks to the cloud to save on computing resources and costs. In outsourcing th... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Yongbo Jiang, Yuan Zhou and Tao Feng    
At present, secure multi-party computing is an effective solution for organizations and institutions that want to derive greater value and benefit from the collaborative computing of their data. Most current secure multi-party computing solutions use enc... ver más
Revista: Information    Formato: Electrónico

 
en línea
Jiajian Tang, Zhenfu Cao, Jiachen Shen and Xiaolei Dong    
With the development of privacy-preserving techniques, the increasing demand for secure multiparty computation (MPC) of mobile devices has become a significant challenge. Unfortunately, it is inapplicable for mobile devices to implement the existing secu... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Weijing You, Lei Lei, Bo Chen and Limin Liu    
By only storing a unique copy of duplicate data possessed by different data owners, deduplication can significantly reduce storage cost, and hence is used broadly in public clouds. When combining with confidentiality, deduplication will become problemati... ver más
Revista: Information    Formato: Electrónico

 
en línea
Nikos Fotiou and George C. Polyzos    
Information-Centric Networking (ICN) is an emerging communication paradigm built around content names. Securing ICN using named-based security is, therefore, a natural choice. For this paper, we designed and evaluated name-based security solutions that s... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Jingsha He, Jianan Wu, Nafei Zhu and Muhammad Salman Pathan    
To enhance the efficiency of data searching, most data owners store their data files in different cloud servers in the form of cipher-text. Thus, efficient search using fuzzy keywords becomes a critical issue in such a cloud computing environment. This p... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Chen Guo, Xingbing Fu, Yaojun Mao, Guohua Wu, Fagen Li and Ting Wu    
With the advent of cloud computing, more and more users begin to outsource encrypted files to cloud servers to provide convenient access and obtain security guarantees. Searchable encryption (SE) allows a user to search the encrypted files without leakin... ver más
Revista: Information    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »