-
1Academic Journal
Authors: Imane Zerraza, Zianou Ahmed Seghir, Mounir Hemam
Source: International Journal of Safety and Security Engineering. 14:807-813
Subject Terms: FOS: Computer and information sciences, Authentication, Computer network, IoT Security, Internet of Things and Edge Computing, Computer Networks and Communications, User Authentication Methods and Security Measures, Internet of Things, Continuous Authentication, Edge computing, Security Challenges in Cloud Computing, Computer science, Mobile Edge Computing, Enhanced Data Rates for GSM Evolution, Authentication (law), Computer security, Computer Science, Physical Sciences, Telecommunications, Edge Computing, Access control, Embedded system, Information Systems
-
2Academic Journal
Authors: Nabil El Ioini, Ayoub El Majjodi, David Hästbacka, Tomáš Černý, Davide Taibi
Contributors: Tampere University, Computing Sciences
Source: Proceedings of the 3rd Eclipse Security, AI, Architecture and Modelling Conference on Cloud to Edge Continuum. :39-48
Subject Terms: FOS: Computer and information sciences, Developmental psychology, Knowledge management, FOS: Political science, MEDLINE, Resource (disambiguation), FOS: Law, Cloud Computing and Big Data Technologies, Security Challenges in Cloud Computing, Data science, Software Diversity, Artificial Intelligence, Cloud computing, Psychology, Business, Political science, Order (exchange), Language-based Information Flow Security, Computer network, Grey literature, Maturity (psychological), 113 Computer and information sciences, Computer science, Process (computing), FOS: Psychology, Operating system, Computer Science, Physical Sciences, Process management, Law, Finance, Information Systems
File Description: fulltext
Access URL: https://trepo.tuni.fi/handle/10024/153422
-
3Academic Journal
-
4Academic Journal
Authors: Ziyuan Liang, Qin Jin, Zhiyong Wang, Zhaohui Chen, Zhaoquan Gu, Yun-Ju Lu, Fan Zhang
Source: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 2 (2024)
Subject Terms: FOS: Computer and information sciences, Secure Multi-party Computation, Computer engineering. Computer hardware, Artificial intelligence, Information technology, Privacy-Preserving Machine Learning, Security Challenges in Cloud Computing, 7. Clean energy, Searchable Encryption, Visual arts, TK7885-7895, Artificial Intelligence, Computer security, Architecture, Secure Computation, Human–computer interaction, Advanced Cryptographic Schemes and Protocols, Multi-Party Computation, Privacy-Preserving Techniques for Data Analysis and Machine Learning, Additive Homomorphic Encryption, Hardware Accelerator, T58.5-58.64, Computer science, Computer Science, Physical Sciences, Privacy-Preserving Computation, Homomorphic Encryption, FOS: Civil engineering, Art, Information Systems
-
5Academic Journal
Source: European Journal of Electrical Engineering and Computer Science. 8:1-8
Subject Terms: FOS: Computer and information sciences, Security Protocols for Authentication and Key Exchange, Authentication, Computer Networks and Communications, Theoretical Framework of Cognitive Informatics and Computational Intelligence, 02 engineering and technology, Remote User Authentication, Security Challenges in Cloud Computing, Cloud Computing, Computer science, Programming language, Operating system, Artificial Intelligence, Computer security, Authentication (law), Computer Science, Physical Sciences, 0202 electrical engineering, electronic engineering, information engineering, Cloud computing security, Cloud computing, Factor (programming language), Information Systems
-
6Academic Journal
Source: International Journal of Safety and Security Engineering. 13:1109-1116
Subject Terms: FOS: Computer and information sciences, Engineering management, Information Security, 4. Education, Information Security Policy Compliance and Awareness, Cyber Security, Security Awareness, Security Challenges in Cloud Computing, 16. Peace & justice, Computer science, Forensic engineering, Engineering, Computer security, Computer Science, Physical Sciences, Security, Remote Data Checking, Business, Information Systems
-
7Academic Journal
Authors: Jiali Xu, Mengyao Xie, Chenggang Wu, Yinqian Zhang, Qijing Li, X.-J. Huang, Y. F. Lai, Yan Kang, Wei Wang, Qiang Wei, Zhe Wang
Source: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. :919-933
Subject Terms: FOS: Computer and information sciences, Economics, Materials Science, Set (abstract data type), Security Challenges in Cloud Computing, Anxiety, Microbiology, Isolation (microbiology), Artificial Intelligence, Materials Chemistry, Psychology, Hardware Security, Memory Protection, Emulation, Embedded system, Biology, Economic growth, Language-based Information Flow Security, Diamond Nanotechnology and Applications, Code (set theory), Psychiatry, Attack surface, Computer science, Panic, Memory address, Programming language, FOS: Psychology, Operating system, Cache, Semiconductor memory, FOS: Biological sciences, Computer Science, Physical Sciences, Information Systems
-
8Academic Journal
Authors: Asif Iqbal, Siffat Ullah Khan, Mahmood Niazi, Mamoona Humayun, Najm Us Sama, Arif Ali Khan, Aakash Ahmad
Source: Wireless Networks. 30:6399-6426
Linked Full TextSubject Terms: FOS: Computer and information sciences, 02 engineering and technology, Nursing, Security Challenges in Cloud Computing, Database security, FOS: Health sciences, Computer science, Software Diversity, Database, Safeguarding, Characterization and Detection of Android Malware, Artificial Intelligence, Computer security, Computer Science, Physical Sciences, Signal Processing, 0202 electrical engineering, electronic engineering, information engineering, Remote Data Checking, Security Analysis, Medicine, Information Systems, Language-based Information Flow Security
-
9Academic Journal
Authors: Nhu-Quynh Luc, Tat Thang Nguyen, Duc Huy Quach, Thanh Toan Dao, Tai The Pham
Source: Engineering, Technology & Applied Science Research. 13:10401-10406
Subject Terms: FOS: Computer and information sciences, Blind signature, Geometry, 0102 computer and information sciences, 02 engineering and technology, Security Challenges in Cloud Computing, 01 natural sciences, 7. Clean energy, Digital signature, Merkle signature scheme, Artificial Intelligence, Android (operating system), Computer security, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Signature (topology), Advanced Cryptographic Schemes and Protocols, 1. No poverty, Computer hardware, Hardware Implementations, Computer science, 3. Good health, Operating system, Applications of Elliptic Curve Cryptography in Security, Computer Science, Physical Sciences, Hash function, Mathematics, Information Systems
-
10Academic Journal
Authors: Mary Idahosa, Saadatu Eireyi-Edewede
Source: International Journal of Librarianship (IJoL), Vol 8, Iss 1 (2023)
Subject Terms: FOS: Computer and information sciences, Medical education, FOS: Political science, FOS: Law, Security Challenges in Cloud Computing, Library science, Bibliography. Library science. Information resources, 12. Responsible consumption, Engineering, Software deployment, Cloud computing, Survey research, Business, Political science, Software engineering, 9. Industry and infrastructure, 4. Education, Cloud Computing, Computer science, Computer Science, Physical Sciences, Business administration, Medicine, Law, Information Systems
-
11Academic Journal
Authors: V. Chandrasekar, Shanmugavalli Venkatachalam
Source: Knowledge and Information Systems. 66:6643-6673
Subject Terms: FOS: Computer and information sciences, Artificial neural network, Artificial intelligence, Security Challenges in Cloud Computing, 7. Clean energy, Database, Big data, Artificial Intelligence, Machine learning, Graph Matching and Analysis Techniques, Cloud computing, 14. Life underwater, 10. No inequality, Data mining, Data Storage, Advanced Cryptographic Schemes and Protocols, 4. Education, Deep learning, Computer science, Operating system, 13. Climate action, Computer Science, Physical Sciences, Computer Vision and Pattern Recognition, Storage efficiency, Information Systems
-
12Academic Journal
Authors: V. Balaji, P. Selvaraj
Source: Intelligent Automation & Soft Computing. 35:2015-2027
Subject Terms: FOS: Computer and information sciences, Computer Networks and Communications, Encryption, Fog Computing, 02 engineering and technology, Security Challenges in Cloud Computing, 7. Clean energy, Server, Artificial Intelligence, Computer security, 0202 electrical engineering, electronic engineering, information engineering, Edge Computing, Cloud computing, Random oracle, Computer network, Internet of Things and Edge Computing, Advanced Cryptographic Schemes and Protocols, Edge computing, Public-key cryptography, Computer science, Homomorphic encryption, Mobile Edge Computing, Enhanced Data Rates for GSM Evolution, Overhead (engineering), Operating system, Computer Science, Physical Sciences, Telecommunications, Fog computing, Privacy-Preserving Computation, Homomorphic Encryption, Information Systems
-
13Academic Journal
Authors: Vivekraj Mannayee, Thirumalai Ramanathan
Source: Intelligent Automation & Soft Computing. 35:1545-1563
Subject Terms: FOS: Computer and information sciences, IoT Security, Computer Networks and Communications, Internet of Things, 02 engineering and technology, Security Challenges in Cloud Computing, 12. Responsible consumption, Database, Blockchain, Computer security, 0202 electrical engineering, electronic engineering, information engineering, Cloud computing, Embedded system, Database transaction, 2. Zero hunger, Internet of Things and Edge Computing, 9. Industry and infrastructure, Blockchain and Internet of Things Integration, Industry 4.0, Computer science, World Wide Web, Operating system, Computer Science, Physical Sciences, The Internet, Information Systems
-
14Academic Journal
Authors: Edgar Roberto Dulce Villarreal, José García‐Alonso, Enrique Moguel, Julio Ariel Hurtado Alegría
Contributors: Universidad de Extremadura. Departamento de Ingeniería de Sistemas Informáticos y Telemáticos, Universidad de Cauca. Colombia, Universidad Nacional Abierta y a Distancia. Colombia, CénitS–COMPUTAEX
Source: Dehesa. Repositorio Institucional de la Universidad de Extremadura
Universidad de Extremadura (UEX)
IEEE Access, Vol 11, Pp 5629-5652 (2023)Subject Terms: FOS: Computer and information sciences, MDE, Computer Networks and Communications, Economics, Arquitectura software, Knowledge management, interoperability, 02 engineering and technology, Security Challenges in Cloud Computing, DSL, Blockchain, Context (archaeology), Computer security, 0202 electrical engineering, electronic engineering, information engineering, Risk analysis (engineering), Business, Biology, 1203 Ciencia de Los Ordenadores, Economic growth, model, Contratos inteligentes, Internet of Things and Edge Computing, Software architecture, Blockchain and Internet of Things Integration, Health care, Paleontology, health, Interoperability, Computer science, TK1-9971, Process (computing), 3. Good health, World Wide Web, Operating system, Computer Science, Physical Sciences, Electrical engineering. Electronics. Nuclear engineering, Cadena de bloques, Process management, Smart contracts, Information Systems
File Description: application/pdf
Linked Full TextAccess URL: http://hdl.handle.net/10662/24516
https://doaj.org/article/1c9fe35264794e33b1c7e9c944e27e5e -
15Academic Journal
Source: IEEE Access, Vol 11, Pp 16605-16620 (2023)
Linked Full TextSubject Terms: FOS: Computer and information sciences, Alternative medicine, FOS: Political science, electronic healthcare, FOS: Law, 02 engineering and technology, Security Challenges in Cloud Computing, health information management, Blockchain, Artificial Intelligence, Computer security, Health records, Pathology, 0202 electrical engineering, electronic engineering, information engineering, data security, Political science, Advanced Cryptographic Schemes and Protocols, Blockchain and Internet of Things Integration, Health care, regulation, Computer science, TK1-9971, 3. Good health, Computer Science, Physical Sciences, Protocol (science), Internet privacy, Medicine, Electrical engineering. Electronics. Nuclear engineering, Law, computer security, Information Systems
-
16Academic Journal
Authors: N. Jagadeeswari, V. Mohan Raj
Source: Computer Systems Science and Engineering. 44:929-943
Subject Terms: FOS: Computer and information sciences, Secure Multi-party Computation, Parallel computing, Virtual memory, 02 engineering and technology, Security Challenges in Cloud Computing, 7. Clean energy, Page, 12. Responsible consumption, Data deduplication, Shared memory, Artificial Intelligence, Virtualization, 11. Sustainability, 0202 electrical engineering, electronic engineering, information engineering, Memory Protection, Language-based Information Flow Security, Memory map, Data diffusion machine, Advanced Cryptographic Schemes and Protocols, Deduplication, Computer science, Operating system, Semiconductor memory, Computer Science, Physical Sciences, Homomorphic Encryption, Memory management, Information Systems
-
17Academic Journal
Source: Computer Systems Science and Engineering. 44:1881-1895
Subject Terms: FOS: Computer and information sciences, Secure Multi-party Computation, Information privacy, Encryption, 02 engineering and technology, Security Challenges in Cloud Computing, FOS: Economics and business, Server, Artificial Intelligence, Computer security, Data integrity, Accounting, Cloud computing security, 0202 electrical engineering, electronic engineering, information engineering, Cloud computing, Business, Attribute-Based Encryption, Data security, Provable Data Possession, Marketing, Computer network, Advanced Cryptographic Schemes and Protocols, Blockchain and Internet of Things Integration, Audit, Computer science, Outsourcing, Operating system, Privacy, Authentication (law), Computer Science, Physical Sciences, Privacy-Preserving Computation, Information Systems
-
18Academic Journal
Source: Intelligent Automation & Soft Computing. 36:2055-2070
Subject Terms: FOS: Computer and information sciences, Cloud storage, Computer network, Blockchain and Internet of Things Integration, Privacy-Preserving Techniques for Data Analysis and Machine Learning, 1. No poverty, Upload, Security Challenges in Cloud Computing, Cloud Computing, Computer science, Overhead (engineering), Operating system, Blockchain, Artificial Intelligence, Authentication (law), Computer security, Data integrity, Computer Science, Physical Sciences, Cloud computing security, Cloud computing, Information Systems, Secure Computation
-
19Academic Journal
Source: Computer Systems Science and Engineering. 44:1125-1142
Subject Terms: FOS: Computer and information sciences, Trust management (information system), Support vector machine, IoT Security, Naive Bayes classifier, Internet of Things and Edge Computing, Computer Networks and Communications, Internet of Things, Privacy-Preserving Techniques for Data Analysis and Machine Learning, Trust Management, 02 engineering and technology, Security Challenges in Cloud Computing, Computer science, 7. Clean energy, World Wide Web, Artificial Intelligence, Computer security, Computer Science, Physical Sciences, Machine learning, Remote Data Checking, 0202 electrical engineering, electronic engineering, information engineering, Data mining, The Internet, Information Systems
-
20Academic Journal
Authors: R. Mangalagowri, Revathi Venkataraman
Source: Intelligent Automation & Soft Computing. 35:1565-1580
Subject Terms: FOS: Computer and information sciences, 02 engineering and technology, Security Challenges in Cloud Computing, Malware, 7. Clean energy, Characterization and Detection of Android Malware, Adversary, Server, Artificial Intelligence, Virtualization, Computer security, Side-Channel Attacks, 0202 electrical engineering, electronic engineering, information engineering, Cache Attacks, Cloud computing, Language-based Information Flow Security, Computer network, 9. Industry and infrastructure, Cloud Computing, Computer science, Virtual machine, Distributed computing, 3. Good health, Operating system, Computer Science, Physical Sciences, Signal Processing, Remote Data Checking, Information Systems