標(biāo)題: Titlebook: Cloud Computing and Big Data: Technologies, Applications and Security; Mostapha Zbakh,Mohammed Essaaidi,Chunming Rong Conference proceedin [打印本頁(yè)] 作者: 冰凍 時(shí)間: 2025-3-21 17:21
書(shū)目名稱Cloud Computing and Big Data: Technologies, Applications and Security影響因子(影響力)
書(shū)目名稱Cloud Computing and Big Data: Technologies, Applications and Security影響因子(影響力)學(xué)科排名
書(shū)目名稱Cloud Computing and Big Data: Technologies, Applications and Security網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Cloud Computing and Big Data: Technologies, Applications and Security網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Cloud Computing and Big Data: Technologies, Applications and Security被引頻次
書(shū)目名稱Cloud Computing and Big Data: Technologies, Applications and Security被引頻次學(xué)科排名
書(shū)目名稱Cloud Computing and Big Data: Technologies, Applications and Security年度引用
書(shū)目名稱Cloud Computing and Big Data: Technologies, Applications and Security年度引用學(xué)科排名
書(shū)目名稱Cloud Computing and Big Data: Technologies, Applications and Security讀者反饋
書(shū)目名稱Cloud Computing and Big Data: Technologies, Applications and Security讀者反饋學(xué)科排名
作者: esculent 時(shí)間: 2025-3-21 23:45 作者: 帳單 時(shí)間: 2025-3-22 00:34
FADETPM: Novel Approach of File Assured Deletion Based on Trusted Platform Module,ak since its security relies entirely on the security of the key manager..In this chapter, we propose a new scheme that aims to improve the security of FADE by using the TPM (Trusted Platform Module). Implemented carefully in the hardware, the TPM is resistant to software attacks and hence it can al作者: 膽小懦夫 時(shí)間: 2025-3-22 08:11
On the Security of Medical Image Processing in Cloud Environment,rmance and security. In the light of this fact, we use a simple method based on fragmentation to support a distributed image processing architecture, as well as data privacy. The proposed methods combine a clustering method, the Fuzzy C-Means (FCM) algorithm, and a Genetic Algorithm (GA) to satisfy 作者: 寒冷 時(shí)間: 2025-3-22 09:14 作者: COST 時(shí)間: 2025-3-22 16:50 作者: COST 時(shí)間: 2025-3-22 19:37 作者: 格子架 時(shí)間: 2025-3-22 22:00
Optimizations in Fully Homomorphic Encryption,th different key sizes. Among the tools we are using in this work, a small laptop with characteristics: bi-cores Intel core i5 CPU running at 2.40?GHz, with 512?KB L2 cache and 4?GB of Random Access Memory. Our implementation takes about 18?min to evaluate an entire AES circuit using a key of 1024 b作者: ARIA 時(shí)間: 2025-3-23 04:22 作者: Intractable 時(shí)間: 2025-3-23 09:33 作者: 皺痕 時(shí)間: 2025-3-23 12:00 作者: 事物的方面 時(shí)間: 2025-3-23 14:06
Cloud Computing and Big Data: Technologies, Applications and Security作者: Femish 時(shí)間: 2025-3-23 20:59
Conference proceedings 2019 at breathtaking speed. They are among the most frequently used technologies for developing applications and services in many fields, such as the web, health, and energy.? ..Accordingly, cloud computing and Big Data technologies are two of the most central current and future research mainstreams. Th作者: RAGE 時(shí)間: 2025-3-24 01:16 作者: 撫育 時(shí)間: 2025-3-24 04:25 作者: audiologist 時(shí)間: 2025-3-24 06:46
Physikalische Behandlungsma?nahmenak since its security relies entirely on the security of the key manager..In this chapter, we propose a new scheme that aims to improve the security of FADE by using the TPM (Trusted Platform Module). Implemented carefully in the hardware, the TPM is resistant to software attacks and hence it can al作者: conception 時(shí)間: 2025-3-24 12:07 作者: Pert敏捷 時(shí)間: 2025-3-24 18:46 作者: 敬禮 時(shí)間: 2025-3-24 22:52
Intradiskale elektrodermale Therapie (IDET)a method using .-closeness for multiple sensitive numerical (MSN) attributes is presented. The method could be applied on both single and multiple sensitive numerical attributes. In the case where the data set contains attributes with high correlation, then our method will be applied only on one num作者: amphibian 時(shí)間: 2025-3-24 23:33
Intradiskale elektrodermale Therapie (IDET)chitecture, in order to resolve the problem of latency which is imposed in transactional requests (GAB Network). We consider the real example that data comes from different sources (Automatic monitoring Centers, GAB, Facebook, Twitter, Instagram, LinkedIn, Medical Centers, Commercial Centers and any作者: concentrate 時(shí)間: 2025-3-25 07:07 作者: 間接 時(shí)間: 2025-3-25 09:24 作者: 使出神 時(shí)間: 2025-3-25 15:26 作者: 確定方向 時(shí)間: 2025-3-25 16:46 作者: Pericarditis 時(shí)間: 2025-3-25 23:41 作者: 鍵琴 時(shí)間: 2025-3-26 03:30
Epidemiologie funktioneller Schmerzend and download the data in a secure way plays an important role, as users are nowadays performing these actions on all types of devices, including e.g. smartphones. Signing and encryption of the sensitive data before hosting can solve potential security breaches. In this chapter, we propose two high作者: foppish 時(shí)間: 2025-3-26 04:18 作者: Calibrate 時(shí)間: 2025-3-26 11:03 作者: 情感脆弱 時(shí)間: 2025-3-26 14:03 作者: Psa617 時(shí)間: 2025-3-26 20:16
Dokumentation in der Schmerztherapie, plenty of Cloud Storage spaces, especially for mobile’s use. Due to the massive use of this means of storage increase issues and threats. Thus, many efforts are dedicated by scientific and researches all over the word to avoid these risks and solve the various security problems that confront Cloud作者: 本能 時(shí)間: 2025-3-27 00:32
Dokumentation in der Schmerztherapiemand to users. Mobile cloud computing is a way of enriching users of mobile devices with the computational resources and services of clouds. The recent developments of mobile devices and their sensors introduced the crowd sensing paradigm that uses powerful cloud computing to analyze, manage and sto作者: 異端邪說(shuō)2 時(shí)間: 2025-3-27 03:01
Diagnostik des Schmerzpatientenonic medical records. In this concept, distributed computational resources can be shared by multiple clients in order to achieve significant cost savings. However, despite all these great advantages, security and privacy remain the major concerns hindering the wide adoption of cloud technology. In t作者: TOXIC 時(shí)間: 2025-3-27 07:51
Diagnostik des Schmerzpatienten given computational problem. Before implementing new applications running on the cloud, it is often useful to estimate the performance/cost of various implementations. In this paper we will compare different scenarios of collaborative intrusion detection systems that we have proposed already in a p作者: 鎮(zhèn)壓 時(shí)間: 2025-3-27 12:10 作者: 踉蹌 時(shí)間: 2025-3-27 16:19 作者: Talkative 時(shí)間: 2025-3-27 20:10 作者: 遵循的規(guī)范 時(shí)間: 2025-3-27 23:45
Physikalische Behandlungsma?nahmennsibility. SLA involves different actors including customers and service providers. The problem that arises is how to establish an SLA contract between those actors and especially how to help the customer to choose the provider that offers the adequate services. Another important point is the measur作者: BULLY 時(shí)間: 2025-3-28 04:02
Intradiskale elektrodermale Therapie (IDET)uch as color, texture, shape are used to identify the content of images. However, the retrieving process becomes very challenging due to the hard management of large databases in terms of storage, computation complexity, performance and similarity representation..In this paper, we propose a new appr作者: 逃避現(xiàn)實(shí) 時(shí)間: 2025-3-28 08:21
Psychologische Therapieverfahrene social networks into classes or extract the feelings, attitudes and opinions. This type of classification is called sentiment analysis or opinion mining which is the process of studying people’s opinion, emotion and also classifying a sentence or a document into classes like positive, negative or 作者: 退潮 時(shí)間: 2025-3-28 11:21
https://doi.org/10.1007/978-3-540-29891-5ssified into two broad classes namely external and internal clustering validation indexes depending on whether ground truth or optimal clustering solutions are known in advance or not respectively. Traditional cluster validation indexes are even impossible to perform especially when the size of the 作者: 胖人手藝好 時(shí)間: 2025-3-28 17:24 作者: Frequency-Range 時(shí)間: 2025-3-28 22:26 作者: Noisome 時(shí)間: 2025-3-29 01:02 作者: phytochemicals 時(shí)間: 2025-3-29 05:13
Psychologische Therapieverfahren It has proven to be a valuable tool for aiding decision makers and improving the productivity of enterprise processes, due to its ability to learn and find interesting patterns in the data. Thereby, it is possible to improve supply chains processes by using Machine Learning which generates in gener作者: 我不怕?tīng)奚?nbsp; 時(shí)間: 2025-3-29 10:47 作者: 公理 時(shí)間: 2025-3-29 12:21 作者: DAFT 時(shí)間: 2025-3-29 18:58 作者: ABOUT 時(shí)間: 2025-3-29 19:54 作者: Genome 時(shí)間: 2025-3-30 02:58 作者: 兩種語(yǔ)言 時(shí)間: 2025-3-30 07:44
Elliptic Curve Qu-Vanstone Based Signcryption Schemes with Proxy Re-encryption for Secure Cloud Datd and download the data in a secure way plays an important role, as users are nowadays performing these actions on all types of devices, including e.g. smartphones. Signing and encryption of the sensitive data before hosting can solve potential security breaches. In this chapter, we propose two high作者: 矛盾 時(shí)間: 2025-3-30 11:48
Cloud Computing: Overview and Risk Identification Based on Classification by Type,umer to use computing resources on demand, by means of the Internet, regardless of location and time. This technology also ensures broadband network access with fast realizing as required by the user. Finally, the invoicing is determined according to the usage. However, the pooling of resources incr作者: 大門在匯總 時(shí)間: 2025-3-30 16:19 作者: 不要嚴(yán)酷 時(shí)間: 2025-3-30 18:01
FADETPM: Novel Approach of File Assured Deletion Based on Trusted Platform Module,users concerns are beginning to grow about the security and the privacy of their data. Assured deletion of data hosted in cloud providers platforms is on top of these concerns since all implemented solutions are proposed and totally controlled by the cloud services providers companies..Cryptographic作者: Ruptured-Disk 時(shí)間: 2025-3-30 22:07 作者: reserve 時(shí)間: 2025-3-31 03:47 作者: 出汗 時(shí)間: 2025-3-31 07:26 作者: 畸形 時(shí)間: 2025-3-31 11:34 作者: 內(nèi)向者 時(shí)間: 2025-3-31 16:48 作者: Anticoagulants 時(shí)間: 2025-3-31 18:26 作者: Diatribe 時(shí)間: 2025-3-31 23:40
Optimizations in Fully Homomorphic Encryption,, we sketch different technics to optimize and simplify fully homomorphic encryption schemes. Among these technics, we will focus on the trans-ciphering one, for this method we will describe a homomorphic evaluation of the different AES circuits (AES-128, AES-192 and AES-256) using a noise-free full作者: CLIFF 時(shí)間: 2025-4-1 02:39 作者: Bone-Scan 時(shí)間: 2025-4-1 09:45
A New Parallel and Distributed Approach for Large Scale Images Retrieval,uch as color, texture, shape are used to identify the content of images. However, the retrieving process becomes very challenging due to the hard management of large databases in terms of storage, computation complexity, performance and similarity representation..In this paper, we propose a new appr作者: 男生戴手銬 時(shí)間: 2025-4-1 12:06
Classification of Social Network Data Using a Dictionary-Based Approach,e social networks into classes or extract the feelings, attitudes and opinions. This type of classification is called sentiment analysis or opinion mining which is the process of studying people’s opinion, emotion and also classifying a sentence or a document into classes like positive, negative or 作者: 恫嚇 時(shí)間: 2025-4-1 17:51
Parallel and Distributed Map-Reduce Models for External Clustering Validation Indexes,ssified into two broad classes namely external and internal clustering validation indexes depending on whether ground truth or optimal clustering solutions are known in advance or not respectively. Traditional cluster validation indexes are even impossible to perform especially when the size of the