Sign Up to like & get
recommendations!
0
Published in 2018 at "Cluster Computing"
DOI: 10.1007/s10586-018-2072-8
Abstract: Outsourcing data to a third-party controlled cloud computing services arises various security issues. High security schemes are required to protect data in the cloud platform. Division and Replication of Data in the Cloud for Optimal…
read more here.
Keywords:
improved security;
security performance;
enhancement sepecloud;
security ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Telecommunication Systems"
DOI: 10.1007/s11235-017-0381-5
Abstract: Underlay mechanism allows concurrent communications of primary users and secondary users in cognitive radio networks (CRNs), causing mutual interference between them. However, current literature neglects primary interference or considers it as Gaussian noise. In addition,…
read more here.
Keywords:
interference;
security performance;
noise;
performance ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Renewable and Sustainable Energy Reviews"
DOI: 10.1016/j.rser.2018.03.070
Abstract: Abstract A secure energy supply is indispensable for Japan's economic activity, but it is becoming more difficult to attain, due to increasing energy demand in emerging countries. The pattern of socioeconomic development and the achievement…
read more here.
Keywords:
japan;
energy security;
security performance;
energy ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Systems, Man, and Cybernetics: Systems"
DOI: 10.1109/tsmc.2022.3144854
Abstract: Cancelable biometrics is a powerful remedy for information leakage caused by the extensive usage of unprotected biometric data. Current measures usually suffer from deteriorated accuracy, which is known as the security–performance tradeoff. Motivated by these…
read more here.
Keywords:
security performance;
performance tradeoff;
fingerprint;
min max ... See more keywords