Font Size: a A A
Keyword [Encrypted data]
Result: 81 - 94 | Page: 5 of 5
81. Privacy-preserving query processing over encrypted data in cloud
82. Research On Secure Deduplication For Outsourced Data In Cloud Computing
83. Research On Encrypted Data Queries And Their Applications
84. Design And Analysis Of Verifiable Outsourced Computation Scheme Based On Encrypted Data
85. Research And Design Of Cloud-Oriented Encrypted Data Search System
86. Sorting And Searching Method Of Encrypted Data Based On Mark Matching And Dimension Reduction Grouping
87. Research On Efficient Malicious Traffic Detection Method For Encrypted Data
88. Research On Security Deduplication Technology Of Cloud Storage Encrypted Data
89. Research On Cross-user Data Deduplication Over Encrypted Data
90. Encrypted Packet Inspection Based On Oblivious Transfer
91. Research On Deduplication Protocol Over Encrypted Data
92. High-Performance Encrypted Data Deduplication System Based On Trusted Execution Environment
93. Encrypted Data Sharing With Timing Revocation Authorization
94. Research On Search Technology Of Encrypted Data In Cloud Outsourcing Storage
  <<First  <Prev  Next>  Last>>  Jump to