Confimizer: A novel algorithm to optimize cloud resource by confidentiality-cost trade-off using bilstm network
The world is expiring a 23% annual data growth rate and is projected to have a total surplus
volume of 175 Zettabytes by 2025. It imposes significant challenges for small to medium …
volume of 175 Zettabytes by 2025. It imposes significant challenges for small to medium …
[HTML][HTML] Real-time privacy-preserved auditing for shared outsourced data
F Tang, Y Li, Y Zhang, W Susilo, B Li - Computer Standards & Interfaces, 2025 - Elsevier
Health providers need to share patient information across healthcare networks efficiently
and securely to improve medical and health services. Timely data synchronization among …
and securely to improve medical and health services. Timely data synchronization among …
A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices
The widespread and growing interest in the Internet of Things (IoT) may be attributed to its
usefulness in many different fields. Physical settings are probed for data, which is then …
usefulness in many different fields. Physical settings are probed for data, which is then …
An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing
Nowadays, the need for cloud computing has increased due to the exponential growth in
information transmission. Cybercriminals are persistent in their efforts to breach cloud …
information transmission. Cybercriminals are persistent in their efforts to breach cloud …
Construction of embedded online teaching platform based on AES-RSA encryption algorithm
X Kong, G Yue - Discover Artificial Intelligence, 2024 - Springer
With the development of economy, people's demand for high-quality and diversified
educational resources increases. However, under the frequent occurrence of network …
educational resources increases. However, under the frequent occurrence of network …
[HTML][HTML] Enhancing the Security in Group Message Communication Using Multi-Party Key Distribution Technique
B Haldar, R Sinha, P Paul - Journal of Mobile …, 2024 - journals.riverpublishers.com
Authentication and authorization techniques are essential for any kind of secure transaction
over the Internet. It enables and empowers mechanisms to implement highly secure systems …
over the Internet. It enables and empowers mechanisms to implement highly secure systems …
DiscoverArtificial Intelligence
X Kong, G Yue - Discover, 2024 - search.proquest.com
With the development of economy, people's demand for high-quality and diversified
educational resources increases. However, under the frequent occurrence of network …
educational resources increases. However, under the frequent occurrence of network …