Data Integrity For Cloud Computing With Homomorphic Encryption
Cloud computing is a new computing model in which resources are provided as general utilities that users can lease through the Internet on-demand fashion. How- ever, this technology has numerous data security concerns. Asymmetric Homomorphic cryptosystem has been acknowledged as one of the potential...
| Main Author: | Awadallah, Ruba N S |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2022
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/59234/ |
| Abstract | Abstract here |
Similar Items
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Integrating Identity-Based Encryption (Ibe) In The Return Routability Protocol (Rrp) To Enhance Signals Security
In Mobile Ipv6.
by: S. Alsayfi, Majed Salam
Published: (2010)
by: S. Alsayfi, Majed Salam
Published: (2010)
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
Model Of Cloud Accounting Adoption
Among Indonesian Micro, Small And
Medium Enterprises (Msmes)
by: Hamundu, Ferdinand Murni
Published: (2022)
by: Hamundu, Ferdinand Murni
Published: (2022)
Cloud Resource Management Framework Using Monarch Butterfly Harmony Search And Case Based Reasoning
by: Ahmed Mohamed Ghetas, Mohamed Rezk
Published: (2017)
by: Ahmed Mohamed Ghetas, Mohamed Rezk
Published: (2017)
Sensorml-Nt: Innovative Cloud Service Sensor Description For Mobile Devices Handling Environmental Issues.
by: Yazdi, Nazi Tabatabaei
Published: (2011)
by: Yazdi, Nazi Tabatabaei
Published: (2011)
Mobile Cloud And Cloudlets Gaming System (Mccg) Using Clustered Destination-Sequenced Distance Vector Routing Protocol(C-DSDV)
by: Doraisamy, Vaithegy
Published: (2020)
by: Doraisamy, Vaithegy
Published: (2020)
Optimized feature construction methods for data summarizations of relational data
by: Sze, Florence Sia Fui
Published: (2014)
by: Sze, Florence Sia Fui
Published: (2014)
Enhanced Automated Heterogeneous Data Duplication Model Using Parallel Data Compression And Sorting Technique
by: Rostam, Nur Aqilah Paskhal
Published: (2019)
by: Rostam, Nur Aqilah Paskhal
Published: (2019)
Adapting And Enhancing Hybrid Computational Methods For RNA
Secondary Structure Prediction
by: Al-Khatib, Ra’ed Mohammad Ali
Published: (2011)
by: Al-Khatib, Ra’ed Mohammad Ali
Published: (2011)
A Context-Aware Based Authorization
System For Pervasive Grid Computing
by: Lim , Marilyn Chien Hui
Published: (2015)
by: Lim , Marilyn Chien Hui
Published: (2015)
Framework To Enhance Veracity And Quality Of Big Data
by: Ridzuan, Fakhitah
Published: (2021)
by: Ridzuan, Fakhitah
Published: (2021)
Compute Language Interface: A Transparent Wrapper Library For Multi Cpu-Gpu
by: Ooi, Keng Siang
Published: (2013)
by: Ooi, Keng Siang
Published: (2013)
A Framework For Flexible Data Consistency In Collaborative Editing
by: Omar , Mohd Adib
Published: (2009)
by: Omar , Mohd Adib
Published: (2009)
A Framework For Privacy Diagnosis And
Preservation In Data Publishing
by: Mirakabad, Mohammad Reza Zare
Published: (2010)
by: Mirakabad, Mohammad Reza Zare
Published: (2010)
Computer Aided 3d Skull - 2d Photo Superimposition For Forensic Anthropology
by: Tan, Joi San
Published: (2017)
by: Tan, Joi San
Published: (2017)
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
Examining The Impact Of Computer-Based Assessment On Higher Education Student Performance In Kano, Nigeria
by: Bello, Hassan
Published: (2024)
by: Bello, Hassan
Published: (2024)
Learning And Optimization Of The Kernel Functions From Insufficiently Labeled Data
by: Abbasnejad, M. Ehsan
Published: (2010)
by: Abbasnejad, M. Ehsan
Published: (2010)
Privacy Preservation Model For Data Exposure In Android Smartphone Usage
by: Abu Bakar, Anizah
Published: (2021)
by: Abu Bakar, Anizah
Published: (2021)
Bounded Box-Zoning Integrated Approach For Children Handwriting Recognition
by: Qausbee, Nik Nur Adlin Nik
Published: (2024)
by: Qausbee, Nik Nur Adlin Nik
Published: (2024)
Semi-fluid: A Content Distribution Model For Faster
Dissemination Of Data
by: Saleh, Salah Noori
Published: (2010)
by: Saleh, Salah Noori
Published: (2010)
Semi-Fluid: A Content Distribution Model For Faster Dissemination Of Data
by: Saleh, Salah Noori
Published: (2010)
by: Saleh, Salah Noori
Published: (2010)
Classification Of P300 Signals In Brain-Computer Interface Using Neural Networks With Adjustable Activation Functions
by: Aslarzanagh, Seyed Aliakbar Mousavi
Published: (2013)
by: Aslarzanagh, Seyed Aliakbar Mousavi
Published: (2013)
Integrated Framework For Secure Distributed Management Of
Duplicated Ipv6 Address Detection
by: Ul Rehman, Shafiq
Published: (2017)
by: Ul Rehman, Shafiq
Published: (2017)
Taylor-Bird Swarm Optimization-Based Deep Belief Network For Medical Data Classification
by: Mohammed, Alhassan Afnan
Published: (2022)
by: Mohammed, Alhassan Afnan
Published: (2022)
A Data Grid Replica Management System With
Local And Global Multi-Objective Optimization
by: E. Almistarihi, Husni Hamad
Published: (2009)
by: E. Almistarihi, Husni Hamad
Published: (2009)
Filtered Distance Matrix For
Constructing High-Throughput
Multiple Sequence Alignment On
Protein Data
by: Mohammad Abu-Hashem, Muhannad Abdul-Qader
Published: (2015)
by: Mohammad Abu-Hashem, Muhannad Abdul-Qader
Published: (2015)
Initial File-Placement In Data Grid Environment Using Game Theory And Fictitious Play
by: Indrayanto, Aloysius
Published: (2008)
by: Indrayanto, Aloysius
Published: (2008)
Multimodal Semantics Integration Using Ontologies Enhanced By Ontology Extraction And Cross Modality Disambiguation
by: Shareha, Ahmad Adel Ahmad Abu
Published: (2012)
by: Shareha, Ahmad Adel Ahmad Abu
Published: (2012)
Pharmacoepidemiological Aspects
Of Oral Contraceptives
From A Family Planning Clinic
In Penang
by: N Nagalingam, Ambigadevy
Published: (1995)
by: N Nagalingam, Ambigadevy
Published: (1995)
Artificial Bee Colony With Differential Evolution Algorithm For Feature Extraction And Selection Of Mass Spectrometry Data
by: Mohamed Yusoff, Syarifah Adilah
Published: (2016)
by: Mohamed Yusoff, Syarifah Adilah
Published: (2016)
A Denoising Generative Adversarial Network Based On Enhanced Feature Mapping Of Data Augmentation For Image Synthesis
by: Chen, Li
Published: (2024)
by: Chen, Li
Published: (2024)
Migration From A Relational Database To A Document-Oriented Database Based On Document-Oriented Data Schema
by: M S, Hamouda Shady
Published: (2020)
by: M S, Hamouda Shady
Published: (2020)
Enhanced 3-Tier Storage Management Scheme For Flash Memory-Based Solid State Disk
by: Alsalibi, Ahmed I N
Published: (2017)
by: Alsalibi, Ahmed I N
Published: (2017)
Smart Child Portal: User Requirements For Children‟S Portal
by: Basim Obaid N, Althagfi
Published: (2010)
by: Basim Obaid N, Althagfi
Published: (2010)
Hippocampus Segmentation Using Locally Integrated Prior-Based Level Set Guided By Assembled And Weighted
Coherent Point Drift Registration
by: Achuthan, Anusha
Published: (2016)
by: Achuthan, Anusha
Published: (2016)
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2022)
by: Alawida, Moatsum Khalif Oduh
Published: (2022)
Enhanced Se-Resnet 101 For Food Image Segmentation
by: Abuowaida, Suhaila Farhan Ahmad
Published: (2022)
by: Abuowaida, Suhaila Farhan Ahmad
Published: (2022)
Similar Items
-
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020) -
Integrating Identity-Based Encryption (Ibe) In The Return Routability Protocol (Rrp) To Enhance Signals Security
In Mobile Ipv6.
by: S. Alsayfi, Majed Salam
Published: (2010) -
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009) -
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010) -
Model Of Cloud Accounting Adoption
Among Indonesian Micro, Small And
Medium Enterprises (Msmes)
by: Hamundu, Ferdinand Murni
Published: (2022)
