共 32 条
[1]
Meyer D.T., Bolosky W.J., A Study of Practical Deduplication, (2011)
[2]
Abdullah K.A., Al-Jafari M., The effect of Sarbanes-Oxley Act (SOX) on corporate value and performance, Eur. J. Econ. Finance Adm. Sci., pp. 42-55, (2011)
[3]
Jacob W.S., Multi-objective genetic algorithm and CNN-based deep learning architectural scheme for effective spam detection, International Journal of Intelligent Networks, 3, pp. 9-15, (2022)
[4]
Jain A.K., Sahoo S.R., Kaubiyal J., Online social networks security and privacy: comprehensive review and analysis, Complex & Intelligent Systems, 7, 5, pp. 2157-2177, (2021)
[5]
Thabit F., Can O., Alhomdy S., Al-Gaphari G.H., Jagtap S., A novel effective lightweight homomorphic cryptographic algorithm for data security in cloud computing, International Journal of intelligent networks, 3, pp. 16-30, (2022)
[6]
Fan Y., Lin X., Liang W., Tan G., Nanda P., A secure privacy preserving deduplication scheme for cloud computing, Future Generat. Comput. Syst., 101, pp. 127-135, (2019)
[7]
Razaque A., Shaldanbayeva N., Alotaibi B., Alotaibi M., Murat A., Alotaibi A., Big data handling approach for unauthorized cloud computing access, Electronics, 11, 1, (2022)
[8]
Wu T.-Y., Pan J.-S., Lin C.-F., Improving accessing efficiency of cloud storage using de-duplication and feedback schemes, IEEE Syst. J., 8, 1, pp. 208-218, (2014)
[9]
Yan Z., Li X., Wang M., Vasilakos A.V., Flexible data access control based on trust and reputation in cloud computing, IEEE Transactions on Cloud Computing, 5, 3, pp. 485-498, (2017)
[10]
Haleem A., Javaid M., Singh R.P., Suman R., Rab S., Blockchain technology applications in healthcare: an overview, International Journal of Intelligent Networks, 2, pp. 130-139, (2021)