CBFF: A cloud–blockchain fusion framework ensuring data accountability for multi-cloud environments

Q Li, Z Yang, X Qin, D Tao, H Pan, Y Huang - Journal of Systems …, 2022 - Elsevier
In order to develop emerging industries such as smart healthcare and intelligent
transportation, the government has established various organizations and platforms to …

Protecting personal sensitive data security in the cloud with blockchain

Z Yang, Y Chen, Y Huang, X Li - Advances in Computers, 2021 - Elsevier
To protect personal sensitive data in cloud computing environment, certain issues need to
be addressed, including data ownership, fine-grained access control, transparency and …

Nv-ecryptfs: Accelerating enterprise-level cryptographic file system with non-volatile memory

C Xiao, L Zhang, W Liu, L Cheng, P Li… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
The development of cloud computing and big data results in a large amount of data
transmitting and storing. In order to protect sensitive data from leakage and unauthorized …

Cloud encryption using distributed environmental keys

KL Tsai, FY Leu, YF Huang, C Yang… - … on Innovative Mobile …, 2016 - ieeexplore.ieee.org
In recent years, cloud storage has been popularly used by people in different areas to store
their personal or commercial data so as to make the data able to be accessed anytime and …

以軟硬體參數為基礎之資料加密法

張鉦新 - 2018 - thuir.lib.thu.edu.tw
隨著科技發展, 電子設備使用頻率越來越高. 包含個人, 政府, 企業機構在內, 大量的資料被放置於
電子儲存設備中. 然而, 在網路發達的現代社會, 不論是儲存在雲端電腦, 或者個人電腦的資料 …

Cooperative and human aspects of software engineering: CHASE 2010

Y Dittrich, H Sharp, HW Theophilus… - ACM SIGSOFT …, 2010 - dl.acm.org
Software is created by people--software engineers in cooperation with domain experts,
users and other stakeholders--in varied environments, under various conditions. Thus …

[PDF][PDF] DESIGN AND IMPLEMENTATION OF SECURED COMMUNICATION IN A WIRELESS NETWORK USING MODIFIES ADVANCED ENCRYPTION STANDARD …

OO Felix - researchgate.net
1.1 BACKGROUND Exchange of information has become a very vital part of the human life
as it has become inevitable in day to day activities. With the advent of technology, exchange …

[PDF][PDF] DECOMPOSITION OF ADVANCED ENCRYPTION STANDARD (AES) ALGORITHM

OO Felix - researchgate.net
ABSTRACT The Advanced Encryption Standard (AES) Algorithm also known as Rijndael is
one of the most widely used algorithms in recent times, it is used to provide adequate …

[PDF][PDF] Environmental Key based Smartphone Data Encryption

KL Tsai, FY Leu, JC Liu, CY Ko - Research Briefs on Information and …, 2016 - rebicte.org
Environmental Key based Smartphone Data Encryption Page 1 Environmental Key based
Smartphone Data Encryption Kun-Lin Tsai1∗, Fang-Yie Leu2†, Jung-Chun Liu2, and Chia-Yin …