RRNS Base Extension Error-Correcting Code for Performance Optimization of Scalable Reliable Distributed Cloud Data Storage
暂无分享,去创建一个
Arutyun Avetisyan | Mikhail G. Babenko | Andrei Tchernykh | Jorge M. Cortés-Mendoza | Elena Golimblevskaia | Luis Bernardo Pulido-Gaytan | Sergio Nesmachnow | J. M. Cortés-Mendoza | Egor Shiryaev | A. Tchernykh | M. Babenko | A. Avetisyan | S. Nesmachnow | Egor Shiryaev | E. Golimblevskaia
[1] Alan T. Litchfield,et al. Taxonomy for Identification of Security Issues in Cloud Computing Environments , 2018, J. Comput. Inf. Syst..
[2] Sajjad Haider,et al. Security threats in cloud computing , 2011, 2011 International Conference for Internet Technology and Secured Transactions.
[3] Ameenudeen Pe,et al. A novel method for error correction using Redundant Residue Number System in digital communication systems , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[4] Andrei Tchernykh,et al. The Accuracy Estimation of the Interval-Positional Characteristic in Residue Number System , 2019, 2019 International Conference on Engineering and Telecommunication (EnT).
[5] L. Willcocks,et al. The emerging Cloud Dilemma: Balancing innovation with cross-border privacy and outsourcing regulations , 2019, Journal of Business Research.
[6] Arutyun Avetisyan,et al. Privacy-Preserving Logistic Regression as a Cloud Service Based on Residue Number System , 2020, RuSCDays.
[7] Andrei Tchernykh,et al. AC-RRNS: Anti-collusion secured data sharing scheme for cloud storage , 2018, Int. J. Approx. Reason..
[8] Arutyun Avetisyan,et al. 2Lbp-RRNS: Two-Levels RRNS With Backpropagation for Increased Reliability and Privacy-Preserving of Secure Multi-Clouds Data Storage , 2020, IEEE Access.
[9] Uwe Schwiegelshohn,et al. Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability , 2016, J. Comput. Sci..
[10] Chip-Hong Chang,et al. A non-iterative multiple residue digit error detection and correction algorithm in RRNS , 2016, IEEE Transactions on Computers.
[11] Andrei Tchernykh,et al. Performance evaluation of secret sharing schemes with data recovery in secured and reliable heterogeneous multi-cloud storage , 2019, Cluster Computing.
[12] Nikolay I. Chervyakov,et al. The architecture of a fault-tolerant modular neurocomputer based on modular number projections , 2018, Neurocomputing.
[13] Lie-Liang Yang,et al. Redundant residue number system based error correction codes , 2001, IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211).
[14] Mohammad Umar Siddiqi,et al. Multiple error detection and correction based on redundant residue number systems , 2008, IEEE Transactions on Communications.
[15] Nikolay I. Chervyakov,et al. AR-RRNS: Configurable reliable distributed data storage systems for Internet of Things to ensure security , 2017, Future Gener. Comput. Syst..
[16] Rajkumar Buyya,et al. Next generation cloud computing: New trends and research directions , 2017, Future Gener. Comput. Syst..
[17] Mikhail G. Babenko,et al. Neural network method for base extension in residue number system , 2020, ICCS-DE.
[18] Andrei Tchernykh,et al. Weighted Two-Levels Secret Sharing Scheme for Multi-Clouds Data Storage with Increased Reliability , 2019, 2019 International Conference on High Performance Computing & Simulation (HPCS).
[19] Mikhail G. Babenko,et al. Increasing reliability and fault tolerance of a secure distributed cloud storage , 2020, ICCS-DE.
[20] Jin B. Hong,et al. Systematic identification of threats in the cloud: A survey , 2019, Comput. Networks.
[21] S. Piestrak,et al. RNS Number Comparator Based on a Modified Diagonal Function , 2020 .
[22] Said Hamdioui,et al. Redundant Residue Number System Code for Fault-Tolerant Hybrid Memories , 2011, JETC.
[23] Arutyun Avetisyan,et al. Privacy-preserving neural networks with Homomorphic encryption: Challenges and opportunities , 2021, Peer-to-Peer Networking and Applications.
[24] E.-G. Talbi,et al. Positional Characteristics for Efficient Number Comparison over the Homomorphic Encryption , 2019, Programming and Computer Software.
[25] Arutyun Avetisyan,et al. Scalable Data Storage Design for Nonstationary IoT Environment With Adaptive Security and Reliability , 2020, IEEE Internet of Things Journal.