A security algorithms approach to apply to the civil registry database of the Ecuador

TT Moisés, OT Antonio… - … Conference on Computer …, 2017 - ieeexplore.ieee.org
It was analyzed the most frequent security algorithms used for information security to
mitigate the integrity, confidentiality and availability of the information. The objective is to …

An approach of efficient security algorithms for distribute architectures

TT Moises, MG Enrique… - … Conference on Energy …, 2017 - ieeexplore.ieee.org
We analyzed the security algorithms considered as more efficient to mitigate the
vulnerabilities and risks of the information. The objective is to determine a prototype of an …

A Secured Technique for Executing Queries over Multidimensional Encrypted Data

NS Al-Musibe, H Hamdi… - 2023 Intelligent Methods …, 2023 - ieeexplore.ieee.org
In new computing architectures, data is outsourced and sensitive data becomes vulnerable
in various areas. Owners must guarantee that their data are secure from breaches and …

Application of security algorithms to the database of the civil sector innovators of the Republic of Srpska

A Lojić, M Saračević - 2023 10th International Conference on …, 2023 - ieeexplore.ieee.org
In research aimed at determining ways to protect the data of primary and secondary school
students, as well as students and innovators who have submitted their ideas and …

[PDF][PDF] QINCLOUD: AN AGENT-BASED SYSTEM FOR QUERING ENCRYPTED DATA IN CLOUD DATABASES

MM Alsulami, AY Noaman - CS & IT Conference Proceedings, 2017 - csitcp.com
With the rapid growth of technology, cloud computing become more and more popular.
Many organizations have been attracted by the variety of services that have been offered by …

[引用][C] Processing Queries over Multidimensional Encrypted Data

NS Al-Musib - Turkish Journal of Computer and Mathematics …, 2021

[引用][C] SECURE KNN BASED DATA OUTSOURCING IN CLOUD COMPUTING

M CHAKRAVARTHY - 2017 - ANNA UNIVERSITY CHENNAI