Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE)
Texto
Documentos relacionados
Application of EKF to synchronization of chaotic systems is studied in [15] and synchronization is obtained of transmitter and receiver dynamics in case the receiver is
GA are adaptive heuristic search algorithm based relying on the evolutionary thoughts of usual collection and inheritance. In [10] Gopesh Joshi‟s work stand for a
Phospho-ERK expression was found to be higher in malignant tumors compared to benign tumors or normal adrenal glands, suggesting that MAPK/ERK pathway activation could
3 Existe aqui, todavia, um equívoco que a semiótica desfaz: um signo, enquanto elemento de um código, é sempre a representação de “algo ausente”, e essa é a
Keywords: Searchable Symmetric Encryption; Trusted Hardware; Cloud Computing; Privacy; Secure Boolean Querying; Secure Content-Based Image
After this study it was concluded that is possible to create a system, based on the blockchain technology, to store and share sensitive health data with more security and privacy
Along these lines, the objective of a safe deduplication framework is to give data security, against both inside and outside foes, with the space efficiency
O Brasil não conseguiu alcançar uma das metas intermediárias estabelecidas pelo Plano Nacional de Educação (PNE) em relação à alfabetização da população com 15