Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE)
Texto
Documentos relacionados
GA are adaptive heuristic search algorithm based relying on the evolutionary thoughts of usual collection and inheritance. In [10] Gopesh Joshi‟s work stand for a
Phospho-ERK expression was found to be higher in malignant tumors compared to benign tumors or normal adrenal glands, suggesting that MAPK/ERK pathway activation could
3 Existe aqui, todavia, um equívoco que a semiótica desfaz: um signo, enquanto elemento de um código, é sempre a representação de “algo ausente”, e essa é a
O Brasil não conseguiu alcançar uma das metas intermediárias estabelecidas pelo Plano Nacional de Educação (PNE) em relação à alfabetização da população com 15
Application of EKF to synchronization of chaotic systems is studied in [15] and synchronization is obtained of transmitter and receiver dynamics in case the receiver is
Along these lines, the objective of a safe deduplication framework is to give data security, against both inside and outside foes, with the space efficiency
Keywords: Searchable Symmetric Encryption; Trusted Hardware; Cloud Computing; Privacy; Secure Boolean Querying; Secure Content-Based Image
After this study it was concluded that is possible to create a system, based on the blockchain technology, to store and share sensitive health data with more security and privacy