Showing 1741–1752 of 2067 results

  • Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

    Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

    0 out of 5
    4,500

    Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Abstract?Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks. Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers…

  • Secure Deduplication with Efficient and Reliable Convergent Key Management

    Secure Deduplication with Efficient and Reliable Convergent Key Management

    0 out of 5
    4,500

    Secure Deduplication with Efficient and Reliable Convergent Key Management Abstract?Secure Deduplication with Efficient and Reliable Convergent Key Management. Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it is, an arising challenge is to perform secure…

  • Secure Distributed Deduplication Systems with Improved Reliability

    Secure Distributed Deduplication Systems with Improved Reliability

    0 out of 5
    4,500

    Secure Distributed Deduplication Systems with Improved Reliability Abstract? Secure Distributed Deduplication Systems with Improved Reliability. Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. However, there is only one copy for each ?le stored in cloud even if…

  • Secure file transfer System

    Secure file transfer System

    0 out of 5
    4,500

    Secure file transfer System Abstract?Secure file transfer System. The Iowa Campaign Finance Disclosure project (ICFD) is a pilot effort to develop a simple and secure way for candidates running for public office or Political Action Committees (PACs) to disclose required financial information. In the prototype system described in this paper, a candidate or PAC can…

  • Secure kNN Query Processing in  Untrusted Cloud Environments

    Secure kNN Query Processing in Untrusted Cloud Environments

    0 out of 5
    4,500

    Secure kNN Query Processing in Untrusted Cloud Environments Abstract?Mobile devices with geo-positioning capabilities (e.g., GPS) enable users to access information that is relevant to their present location. Users are interested in querying about points of interest (POI) in their physical proximity, such as restaurants, cafes, ongoing events, etc. Entities specialized in various areas of interest…

  • Secure kNN Query Processing in Untrusted Cloud Environments

    Secure kNN Query Processing in Untrusted Cloud Environments

    0 out of 5
    4,500

    Secure kNN Query Processing in Untrusted Cloud Environments   Abstract? Secure kNN Query Processing in Untrusted Cloud Environments. Mobile devices with geo-positioning capabilities (e.g., GPS) enable users to access information that is relevant to their present location. Users are interested in querying about points of interest (POI) in their physical proximity, such as restaurants, cafes,…

  • Secure Logging As a Service -Delegating Log Management to the Cloud

    Secure Logging As a Service -Delegating Log Management to the Cloud

    0 out of 5
    4,500

    Secure Logging As a Service -Delegating Log Management to the Cloud Abstract?Secure Logging As a Service -Delegating Log Management to the Cloud. Securely maintaining log records over extended periods of time is very important to the proper functioning of any organization. Integrity of the log files and that of the logging process need to be…

  • Secure Logging As a Service?Delegating Log Management to the Cloud

    Secure Logging As a Service?Delegating Log Management to the Cloud

    0 out of 5
    4,500

    Secure Logging As a Service?Delegating Log Management to the CloudLog files helps cyber forensic process in inquiring and seizing computer, obtaining electronic evidence for criminal investigations and maintaining computer records for the federal rules of evidence. So it can be said that logging is closely related to Forensic Computing. To make the logs permissible for…

  • Secure Overlay Cloud Storage with Access Control and Assured Deletion document preparation

    Secure Overlay Cloud Storage with Access Control and Assured Deletion document preparation

    0 out of 5
    4,500

    Secure Overlay Cloud Storage with Access Control and Assured Deletion document preparation Abstract? We can now outsource data backups off-site to third-party cloud storage services so as to reduce data management costs. However, we must provide security guarantees for the outsourced data, which is now maintained by third parties. We design and implement FADE, a…

  • Secure Sensitive Data Sharing on a Big Data Platform

    Secure Sensitive Data Sharing on a Big Data Platform

    0 out of 5
    4,500

    Secure Sensitive Data Sharing on a Big Data Platform Abstract? Users store vast amounts of sensitive data on a big data platform. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services. However, secure data sharing is problematic. This paper proposes a framework for secure…

  • Secure Solution for Mobile Access to Patient?s Health Care Record

    Secure Solution for Mobile Access to Patient?s Health Care Record

    0 out of 5
    3,500

    Secure Solution for Mobile Access to Patient?s Health Care Record   Abstract?Secure Solution for Mobile Access to Patient?s Health Care Record. Mobile devices are today widely accepted and their capability to provide access to services independent of user time and location make them well suited for provision of healthcare services to both patients and healthcare…

  • SECURE SOLUTION FOR MOBILE ACCESS TO PATIENT?S HEALTHCARE RECORDS

    SECURE SOLUTION FOR MOBILE ACCESS TO PATIENT?S HEALTHCARE RECORDS

    0 out of 5
    3,500

    SECURE SOLUTION FOR MOBILE ACCESS TO PATIENT?S HEALTHCARE RECORDS Abstract?Mobile devices are today widely accepted and their capability to provide access to services independent of user time and location make them well suited for provision of healthcare services to both patients and healthcare personnel. However, mobile services are still not generally allowed to operate with…

End of content

End of content