Artykuły w czasopismach na temat „Dynamic Proof of Storage”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Dynamic Proof of Storage”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Muthu Selvam, M., K. Mariappan, G. V. Sriramakrishnan, and G. Suseendran. "DeyPoS-homomorphism authenticated tree (HAT) for multi-user locality in cloud storage." International Journal of Engineering & Technology 7, no. 2.31 (2018): 141. http://dx.doi.org/10.14419/ijet.v7i2.31.13427.
Pełny tekst źródłatha, C. Swe, and Jammi Ashok. "Dynamic Proof of Storage (POS)." International Journal of Computer Trends and Technology 52, no. 1 (2017): 17–21. http://dx.doi.org/10.14445/22312803/ijctt-v52p105.
Pełny tekst źródłaDr., Shubhangi D. C*1 &. Pooja2. "DE-DUPLICABLE EFFECTIVE VALIDATION of CAPACITY for DYNAMIC USER ENVIRONMENT." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 8 (2017): 51–56. https://doi.org/10.5281/zenodo.839115.
Pełny tekst źródłaHulsure, Rahul, Amol Datal, and Ambulge S. "Deduplication of Dynamic Proof of Storage for Multi-User Environments." International Journal of Computer Applications 179, no. 38 (2018): 42–44. http://dx.doi.org/10.5120/ijca2018916894.
Pełny tekst źródłaHe, Kun, Jing Chen, Ruiying Du, Qianhong Wu, Guoliang Xue, and Xiang Zhang. "DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments." IEEE Transactions on Computers 65, no. 12 (2016): 3631–45. http://dx.doi.org/10.1109/tc.2016.2560812.
Pełny tekst źródłaGoldstein-Tweg, Tom, Elinor Ginzburg-Ganz, Juri Belikov, and Yoash Levron. "Uniqueness of Optimal Power Management Strategies for Energy Storage Dynamic Models." Energies 18, no. 6 (2025): 1483. https://doi.org/10.3390/en18061483.
Pełny tekst źródłaLi, Ming Chu, Liang Zhang, and Cheng Guo. "Accurate Location in Batch Dynamic Provable Data Possession." Applied Mechanics and Materials 519-520 (February 2014): 9–12. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.9.
Pełny tekst źródłaLin, Jyh-Shyan, Kuo-Hsiung Liao, and Chao-Hsing Hsu. "A Group Collaboratable Proof of Retrievability Scheme for Cloud Data Storage." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 7 (2014): 4625–32. http://dx.doi.org/10.24297/ijct.v13i7.2501.
Pełny tekst źródłaTaek-Young Youn, Nam-Su Jho, Si-Wan Noh, Kyung-Hyune Rhee, and Sang Uk Shin. "Security analysis of DeyPoS scheme." Research Briefs on Information and Communication Technology Evolution 5 (November 30, 2019): 80–85. http://dx.doi.org/10.56801/rebicte.v5i.86.
Pełny tekst źródłaFu, Anmin, Yuhan Li, Shui Yu, Yan Yu, and Gongxuan Zhang. "DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems." Journal of Network and Computer Applications 104 (February 2018): 97–106. http://dx.doi.org/10.1016/j.jnca.2017.12.007.
Pełny tekst źródłaJHO, Nam-Su, Daesung MOON, and Taek-Young YOUN. "Fully Dynamic Data Management in Cloud Storage Systems with Secure Proof of Retrievability." IEICE Transactions on Information and Systems E105.D, no. 11 (2022): 1872–79. http://dx.doi.org/10.1587/transinf.2022ngp0004.
Pełny tekst źródłaBayon, Rocio, Silverio Coco, María Barcenilla, et al. "Feasibility of Storing Latent Heat with Liquid Crystals. Proof of Concept at Lab Scale." Applied Sciences 6 (April 25, 2016): 121 (10). https://doi.org/10.3390/app6050121.
Pełny tekst źródłaChandramohan Kanmani Pappa, Dasthegir Nasreen Banu, Kumar Vaishnavi, Susila Nagarajan, Manivannan Karunakaran, and Perisetla Kandaswamy Hemalatha. "A Novel Approach for Block Chain Technology based Cyber Security in Cloud Storage Using Hash Function." Journal of Advanced Research in Applied Sciences and Engineering Technology 32, no. 3 (2023): 178–89. http://dx.doi.org/10.37934/araset.32.3.178189.
Pełny tekst źródłaDerek Asir Muthurajan Caleb. "AI-Driven Smart Fabric Provisioning: Transforming Network Automation through Intelligent Orchestration and Dynamic Testing." Journal of Computer Science and Technology Studies 7, no. 3 (2025): 783–90. https://doi.org/10.32996/jcsts.2025.7.3.85.
Pełny tekst źródłaNeeta P. Patil. "Secure File Sharing Using Blockchain and IPFS with Smart Contract-Based Access Control." Journal of Information Systems Engineering and Management 10, no. 16s (2025): 184–94. https://doi.org/10.52783/jisem.v10i16s.2588.
Pełny tekst źródłaThrimurthulu, Pallapothu *. P. B. Siva Varma. "DYNAMIC APPROACH FOR SECURE DEDUPLICATION OF DATA OVER THE COLUD." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 1 (2017): 407–12. https://doi.org/10.5281/zenodo.260066.
Pełny tekst źródłaYang, Haibin, Zhengge Yi, Ruifeng Li, et al. "Improved Outsourced Provable Data Possession for Secure Cloud Storage." Security and Communication Networks 2021 (July 22, 2021): 1–12. http://dx.doi.org/10.1155/2021/1805615.
Pełny tekst źródłaVishal, Passricha, Chopra Ashish, Sharma Pooja, and Singhal Shubhanshi. "A secure deduplication scheme for encrypted data." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 2 (2019): 77–86. https://doi.org/10.11591/ijict.v8i2.pp77-86.
Pełny tekst źródłaSlanina, Oliver, Susanne Quabis, and Robert Wynands. "Reproducibility of C. I. P.-compatible dynamic pressure measurements." tm - Technisches Messen 87, no. 10 (2020): 630–36. http://dx.doi.org/10.1515/teme-2020-0060.
Pełny tekst źródłaLi, Xiuguang, Zhengge Yi, Ruifeng Li, Xu-An Wang, Hui Li, and Xiaoyuan Yang. "SM2-Based Offline/Online Efficient Data Integrity Verification Scheme for Multiple Application Scenarios." Sensors 23, no. 9 (2023): 4307. http://dx.doi.org/10.3390/s23094307.
Pełny tekst źródłaLakshminarayani A and A Shaik Abdul Khadir. "A blockchain-integrated smart healthcare framework utilizing dynamic hunting leadership algorithm with deep learning-based disease detection and classification model." Scientific Temper 15, no. 04 (2024): 3281–89. https://doi.org/10.58414/scientifictemper.2024.15.4.37.
Pełny tekst źródłaXia, Qi, Jianbing Ni, John Bosco Aristotle Kanpogninge Ansuura, and James Gee. "Searchable Public-Key Encryption with Data Sharing in Dynamic Groups for Mobile Cloud Storage." JUCS - Journal of Universal Computer Science 21, no. (3) (2015): 440–53. https://doi.org/10.3217/jucs-021-03-0440.
Pełny tekst źródłaRen, Zhengwei, Lina Wang, Qian Wang, and Mingdi Xu. "Dynamic Proofs of Retrievability for Coded Cloud Storage Systems." IEEE Transactions on Services Computing 11, no. 4 (2018): 685–98. http://dx.doi.org/10.1109/tsc.2015.2481880.
Pełny tekst źródłaRao, Lu, Tengfei Tu, Hua Zhang, Qiaoyan Wen, and Jia Xiao. "Dynamic Outsourced Proofs of Retrievability Enabling Auditing Migration for Remote Storage Security." Wireless Communications and Mobile Computing 2018 (2018): 1–19. http://dx.doi.org/10.1155/2018/4186243.
Pełny tekst źródłaMasood, Raziqa, and Q. P. Rana. "Public Auditing for Secure Cloud Storage based on DHT." Journal of University of Shanghai for Science and Technology 23, no. 11 (2021): 86–98. http://dx.doi.org/10.51201/jusst/21/10853.
Pełny tekst źródłaM. Vasuki, Mrs. "Disaster Proof Cloud Data Centers with Advanced Backup and Recovery Using HAEdge." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50054.
Pełny tekst źródłaNugroho, Sri, Luthfi Muhammad Mauludin, Togar Sirait, Mujiman Mujiman, Ahmad Sofyan, and Toto Tohir. "Design of Hybrid Energy System for Railway Application (Case Study of People Mover System in Doha, Qatar)." Current Journal: International Journal Applied Technology Research 4, no. 1 (2023): 1–7. http://dx.doi.org/10.35313/ijatr.v4i1.112.
Pełny tekst źródłaPassricha, Vishal, Ashish Chopra, and Shubhanshi Singhal. "Secure Deduplication Scheme for Cloud Encrypted Data." International Journal of Advanced Pervasive and Ubiquitous Computing 11, no. 2 (2019): 27–40. http://dx.doi.org/10.4018/ijapuc.2019040103.
Pełny tekst źródłaYin, Shanqing, Johnathan Jun Howe Siew, Siew Bee Iris Ng, Andi Sudjana Putra, and Arron Ang. "Functional Redesign of the Hospital Trolley-Bed Tray Table." Ergonomics in Design: The Quarterly of Human Factors Applications 24, no. 4 (2016): 20–26. http://dx.doi.org/10.1177/1064804616630692.
Pełny tekst źródłaJevinger, Åse, and Paul Davidsson. "System Architectures for Sensor-Based Dynamic Remaining Shelf-life Prediction." International Journal of Operations Research and Information Systems 10, no. 4 (2019): 21–38. http://dx.doi.org/10.4018/ijoris.2019100102.
Pełny tekst źródłaKaushik, Shweta, and Charu Gandhi. "Fine Grained Decentralized Access Control With Provable Data Transmission and User Revocation in Cloud." International Journal of Information Security and Privacy 15, no. 2 (2021): 29–52. http://dx.doi.org/10.4018/ijisp.2021040102.
Pełny tekst źródłaAhmad, Shafiq, Zia ur Rehman, Saud Altaf, et al. "Dynamic Key Extraction Technique Using Pulse Signal and Lightweight Cryptographic Authentication Scheme for WBAN." Sustainability 14, no. 21 (2022): 14625. http://dx.doi.org/10.3390/su142114625.
Pełny tekst źródłaVoinov, Vassilly. "An Experimental Supported by Some Strong Theoretical Arguments Proof of the Fundamental Equality P=NP." Central Asia Business Journal 23, no. 1 (2023): 12–31. https://doi.org/10.55861/cabj.23.01.02.
Pełny tekst źródłaSengupta, Binanda, and Sushmita Ruj. "Efficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage." IEEE Transactions on Cloud Computing 8, no. 1 (2020): 138–51. http://dx.doi.org/10.1109/tcc.2017.2767584.
Pełny tekst źródłaNijzink, Remko, Christopher Hutton, Ilias Pechlivanidis, et al. "The evolution of root-zone moisture capacities after deforestation: a step towards hydrological predictions under change?" Hydrology and Earth System Sciences 20, no. 12 (2016): 4775–99. http://dx.doi.org/10.5194/hess-20-4775-2016.
Pełny tekst źródłaPrakash, A. John, and B. Lydia Elizabeth. "Pindex: Private multi-linked index for encrypted document retrieval." PLOS ONE 16, no. 8 (2021): e0256223. http://dx.doi.org/10.1371/journal.pone.0256223.
Pełny tekst źródłaH. Abbdal Refish, Salah. "Data integrity proof and secure computation based on elgamal algorithm and iris extraction in cloud storage." International Journal of Engineering & Technology 7, no. 4 (2019): 6453–57. http://dx.doi.org/10.14419/ijet.v7i4.23293.
Pełny tekst źródłaLIAO, Hongfei, Guohui ZENG, Bo HUANG, Chi MA, Gong CHEN, and Jinbin ZHAO. "Optimal Control Virtual Inertia of Optical Storage Microgrid Based on Improved Sailfish Algorithm." Wuhan University Journal of Natural Sciences 27, no. 3 (2022): 218–30. http://dx.doi.org/10.1051/wujns/2022273218.
Pełny tekst źródłaD, Prof Latha. "Blockchain Solutions for Secure Healthcare Data Management: A Comprehensive Survey." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 03 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem29730.
Pełny tekst źródłaBobde, Yash, Gokuleshwaran Narayanan, Manas Jati, Raja Soosaimarian Peter Raj, Ivan Cvitić, and Dragan Peraković. "Enhancing Industrial IoT Network Security through Blockchain Integration." Electronics 13, no. 4 (2024): 687. http://dx.doi.org/10.3390/electronics13040687.
Pełny tekst źródłaSiva Prasad Nandi. "Serverless databases: Architectural evolution, implementation strategies, and future directions in cloud-native data management." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 567–74. https://doi.org/10.30574/wjarr.2025.26.2.1591.
Pełny tekst źródłaDhomkar, Siddharth, Jacob Henshaw, Harishankar Jayakumar, and Carlos A. Meriles. "Long-term data storage in diamond." Science Advances 2, no. 10 (2016): e1600911. http://dx.doi.org/10.1126/sciadv.1600911.
Pełny tekst źródłaGiaretta, Alberto, Nicola Dragoni, and Fabio Massacci. "S×C4IoT: A Security-by-contract Framework for Dynamic Evolving IoT Devices." ACM Transactions on Sensor Networks 18, no. 1 (2022): 1–51. http://dx.doi.org/10.1145/3480462.
Pełny tekst źródłaGiaretta, Alberto, Nicola Dragoni, and Fabio Massacci. "S×C4IoT: A Security-by-contract Framework for Dynamic Evolving IoT Devices." ACM Transactions on Sensor Networks 18, no. 1 (2022): 1–51. http://dx.doi.org/10.1145/3480462.
Pełny tekst źródłaDumas, Jean-Guillaume, Aude Maignan, Clément Pernet, and Daniel S. Roche. "VESPo: Verified Evaluation of Secret Polynomials (with application to dynamic proofs of retrievability)." Proceedings on Privacy Enhancing Technologies 2023, no. 3 (2023): 354–74. http://dx.doi.org/10.56553/popets-2023-0085.
Pełny tekst źródłaPassricha, Vishal, Ashish Chopra, Pooja Sharma, and Shubhanshi Singhal. "A secure deduplication scheme for encrypted data." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 2 (2019): 77. http://dx.doi.org/10.11591/ijict.v8i2.pp77-86.
Pełny tekst źródłaKeshri, Nandita, Ingo Truppel, Werner B. Herppich, Martin Geyer, Cornelia Weltzien, and Pramod V. Mahajan. "In-Situ Measurement of Fresh Produce Respiration Using a Modular Sensor-Based System." Sensors 20, no. 12 (2020): 3589. http://dx.doi.org/10.3390/s20123589.
Pełny tekst źródłaChoi, Hyung Won, Jinhee Jeong, Ja Ryong Koo, Young Kim, and Yong Tae Kang. "Proof of concept for unsteady dynamic model of sorption thermal battery with H2O/LiBr and universal methodology to optimize energy storage density." Energy 328 (August 2025): 136612. https://doi.org/10.1016/j.energy.2025.136612.
Pełny tekst źródłaMorin-Pépin, Stéphane, and Adel Francis. "Dynamic Spatiotemporal Scheduling for Construction Building Projects." Buildings 14, no. 10 (2024): 3139. http://dx.doi.org/10.3390/buildings14103139.
Pełny tekst źródłaTSUDA, ICHIRO, TAKASHI TAHARA, and HIROAKI IWANAGA. "CHAOTIC PULSATION IN HUMAN CAPILLARY VESSELS AND ITS DEPENDENCE ON MENTAL AND PHYSICAL CONDITIONS." International Journal of Bifurcation and Chaos 02, no. 02 (1992): 313–24. http://dx.doi.org/10.1142/s0218127492000318.
Pełny tekst źródła