374 related articles for article (PubMed ID: 28545151)
1. Provenance based data integrity checking and verification in cloud environments.
Imran M; Hlavacs H; Haq IU; Jan B; Khan FA; Ahmad A
PLoS One; 2017; 12(5):e0177576. PubMed ID: 28545151
[TBL] [Abstract][Full Text] [Related]
2. A keyword searchable attribute-based encryption scheme with attribute update for cloud storage.
Wang S; Ye J; Zhang Y
PLoS One; 2018; 13(5):e0197318. PubMed ID: 29795577
[TBL] [Abstract][Full Text] [Related]
3. Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan.
Sahi A; Lai D; Li Y
Comput Biol Med; 2016 Nov; 78():1-8. PubMed ID: 27639895
[TBL] [Abstract][Full Text] [Related]
4. Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing.
Kibiwott KP; Zhao YN; Kogo J; Zhang FL
Math Biosci Eng; 2019 Apr; 16(5):3561-3594. PubMed ID: 31509915
[TBL] [Abstract][Full Text] [Related]
5. Multi-replicas integrity checking scheme with supporting probability audit for cloud-based IoT.
Yuan Y; Yang F; Wang X; Tian Y; Li Z
PeerJ Comput Sci; 2024; 10():e1790. PubMed ID: 38259890
[TBL] [Abstract][Full Text] [Related]
6. Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage.
Wang S; Gao T; Zhang Y
PLoS One; 2018; 13(11):e0206126. PubMed ID: 30383840
[TBL] [Abstract][Full Text] [Related]
7. Data Privacy in Cloud-assisted Healthcare Systems: State of the Art and Future Challenges.
Sajid A; Abbas H
J Med Syst; 2016 Jun; 40(6):155. PubMed ID: 27155893
[TBL] [Abstract][Full Text] [Related]
8. eHealth Cloud Security Challenges: A Survey.
Al-Issa Y; Ottom MA; Tamrawi A
J Healthc Eng; 2019; 2019():7516035. PubMed ID: 31565209
[TBL] [Abstract][Full Text] [Related]
9. Secure two-party computation of solid triangle area and tetrahedral volume based on cloud platform.
Zhang J; Li L; Tang Y; Luo S; Yang Y; Xin Y
PLoS One; 2019; 14(6):e0217067. PubMed ID: 31194747
[TBL] [Abstract][Full Text] [Related]
10. SM2-Based Offline/Online Efficient Data Integrity Verification Scheme for Multiple Application Scenarios.
Li X; Yi Z; Li R; Wang XA; Li H; Yang X
Sensors (Basel); 2023 Apr; 23(9):. PubMed ID: 37177511
[TBL] [Abstract][Full Text] [Related]
11. An effective, secure and efficient tagging method for integrity protection of outsourced data in a public cloud storage.
ALmarwani R; Zhang N; Garside J
PLoS One; 2020; 15(11):e0241236. PubMed ID: 33151960
[TBL] [Abstract][Full Text] [Related]
12. Secure data storage based on blockchain and coding in edge computing.
Ren YJ; Leng Y; Cheng YP; Wang J
Math Biosci Eng; 2019 Mar; 16(4):1874-1892. PubMed ID: 31137190
[TBL] [Abstract][Full Text] [Related]
13. The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges-A Systematic Literature Review (SLR).
Hassan J; Shehzad D; Habib U; Aftab MU; Ahmad M; Kuleev R; Mazzara M
Comput Intell Neurosci; 2022; 2022():8303504. PubMed ID: 35712069
[TBL] [Abstract][Full Text] [Related]
14. Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services.
Pinheiro A; Dias Canedo E; de Sousa Junior RT; de Oliveira Albuquerque R; GarcĂa Villalba LJ; Kim TH
Sensors (Basel); 2018 Mar; 18(3):. PubMed ID: 29498641
[TBL] [Abstract][Full Text] [Related]
15. Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds.
Guo C; Zhuang R; Jie Y; Ren Y; Wu T; Choo KR
J Med Syst; 2016 Nov; 40(11):235. PubMed ID: 27653042
[TBL] [Abstract][Full Text] [Related]
16. A review on the state-of-the-art privacy-preserving approaches in the e-health clouds.
Abbas A; Khan SU
IEEE J Biomed Health Inform; 2014 Jul; 18(4):1431-41. PubMed ID: 25014943
[TBL] [Abstract][Full Text] [Related]
17. Computer Security Issues and Legal System Based on Cloud Computing.
Li H
Comput Intell Neurosci; 2022; 2022():8112212. PubMed ID: 35860647
[TBL] [Abstract][Full Text] [Related]
18. A Study on CP-ABE-based Medical Data Sharing System with Key Abuse Prevention and Verifiable Outsourcing in the IoMT Environment.
Hwang YW; Lee IY
Sensors (Basel); 2020 Aug; 20(17):. PubMed ID: 32878202
[TBL] [Abstract][Full Text] [Related]
19. A hybrid cloud read aligner based on MinHash and kmer voting that preserves privacy.
Popic V; Batzoglou S
Nat Commun; 2017 May; 8():15311. PubMed ID: 28508884
[TBL] [Abstract][Full Text] [Related]
20. Analysis of an ABE Scheme with Verifiable Outsourced Decryption.
Liao Y; He Y; Li F; Jiang S; Zhou S
Sensors (Basel); 2018 Jan; 18(1):. PubMed ID: 29320418
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]