• Nenhum resultado encontrado

Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE)

N/A
N/A
Protected

Academic year: 2017

Share " Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE)"

Copied!
5
0
0

Texto

Loading

Referências

Documentos relacionados

Application of EKF to synchronization of chaotic systems is studied in [15] and synchronization is obtained of transmitter and receiver dynamics in case the receiver is

GA are adaptive heuristic search algorithm based relying on the evolutionary thoughts of usual collection and inheritance. In [10] Gopesh Joshi‟s work stand for a

Phospho-ERK expression was found to be higher in malignant tumors compared to benign tumors or normal adrenal glands, suggesting that MAPK/ERK pathway activation could

3 Existe aqui, todavia, um equívoco que a semiótica desfaz: um signo, enquanto elemento de um código, é sempre a representação de “algo ausente”, e essa é a

Keywords: Searchable Symmetric Encryption; Trusted Hardware; Cloud Computing; Privacy; Secure Boolean Querying; Secure Content-Based Image

After this study it was concluded that is possible to create a system, based on the blockchain technology, to store and share sensitive health data with more security and privacy

Along these lines, the objective of a safe deduplication framework is to give data security, against both inside and outside foes, with the space efficiency

O Brasil não conseguiu alcançar uma das metas intermediárias estabelecidas pelo Plano Nacional de Educação (PNE) em relação à alfabetização da população com 15