Zobrazeno 1 - 10
of 19
pro vyhledávání: '"VANESSA MIRANDA LOPEZ"'
Autor:
Vanessa Miranda-Lopez, Andrei Tchernykh, Mikhail Babenko, Arutyun Avetisyan, Victor Toporkov, Alexander Yu Drozdov
Publikováno v:
IEEE Access, Vol 8, Pp 199424-199439 (2020)
Cloud storage as service is the mainstream technology used to retain digital data. However, there are significant risks for confidentiality, integrity, and availability violation associated with the loss of information, denial of access, technical fa
Externí odkaz:
https://doaj.org/article/df72696b27a24c3a82b656c8de4ce5ea
Autor:
Andrei Tchernykh, Nikolay I. Chervyakov, Mikhail Babenko, Vanessa Miranda-Lopez, Arutyun Avetisyan, Gleb Radchenko, Raul Rivera-Rodriguez, Zhihui Du, Alexander Yu. Drozdov
Publikováno v:
IEEE Internet of Things Journal. 7:10171-10188
Internet-of-Things (IoT) environment has a dynamic nature with high risks of confidentiality, integrity, and availability violations. The loss of information, denial of access, information leakage, collusion, technical failures, and data security bre
Autor:
Mikhail Babenko, Viktor Andreevich Kuchukov, Raul Rivera-Rodriguez, Andrei Tchernykh, Zhihui Du, El-Ghazali Talbi, Nikolay I. Chervyakov, Vanessa Miranda-Lopez
Publikováno v:
Programming and Computer Software. 45:532-543
Modern algorithms for symmetric and asymmetric encryptions are not suitable to provide security of data that needs data processing. They cannot perform calculations over encrypted data without first decrypting it when risks are high. Residue Number S
Autor:
Vanessa Miranda-Lopez, Jorge M. Cortés-Mendoza, Nikolay I. Chervyakov, Nikolay Nikolaevich Kucherov, Mikhail Babenko, Andrei Tchernykh
Publikováno v:
Future Generation Computer Systems. 92:1080-1092
Benefits of Internet of Things and cloud–fog-edge computing are associated with the risks of confidentiality, integrity, and availability related with the loss of information, denial of access for a long time, information leakage, conspiracy and te
Autor:
Vanessa Miranda-Lopez, Andrei Tchernykh, Mikhail Babenko, Alexander Yu. Drozdov, Gleb Radchenko, Fermin-Alberto Armenta-Cano, Arutyun Avetisyan
Publikováno v:
Cluster Computing. 22:1173-1185
Properties of redundant residue number system (RRNS) are used for detecting and correcting errors during the data storing, processing and transmission. However, detection and correction of a single error require significant decoding time due to the i
Autor:
Arutyun Avetisyan, Maxim Deryabin, Viktor Andreevich Kuchukov, Nikolay Nikolaevich Kucherov, Andrei Tchernykh, Vanessa Miranda-Lopez, Gleb Radchenko, Nikolay I. Chervyakov, Jorge M. Cortés-Mendoza, Mikhail Babenko
Publikováno v:
International Journal of Approximate Reasoning. 102:60-73
Cloud security issues are important factors for data storage and processing. Apart from the existing security and reliability problems of traditional distributed computing, there are new security and reliability problems. They include attacks on a vi
Autor:
VANESSA MIRANDA LOPEZ
Publikováno v:
Centro de Investigación Científica y de Educación Superior de Ensenada
CICESE
Repositorio Institucional CICESE
CICESE
Repositorio Institucional CICESE
The Residue Number System (RNS) is a non-weighted system based on the Chinese Remainder Theorem (CRT). In RNS, the information is divided into smaller segments allowing parallel operations independent of each other. This property is one of the main r
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______3056::1fb5c58a7354139b04213083c6eeac54
http://cicese.repositorioinstitucional.mx/jspui/handle/1007/3564
http://cicese.repositorioinstitucional.mx/jspui/handle/1007/3564
Autor:
C.J. Barrios-Hernandez, Vanessa Miranda-Lopez, Gleb Radchenko, Arutyun Avetisyan, Andrei Tchernykh, Luis Enrique García-Hernández, Alexander Yu. Drozdov, Harold Castro, Mikhail Babenko, Raul Rivera-Rodriguez
Publikováno v:
Communications in Computer and Information Science ISBN: 9783030410049
CARLA
CARLA
Cloud storage is one of the most popular models of cloud computing. It benefits from a shared set of configurable resources without limitations of local data storage infrastructures. However, it brings several cybersecurity issues. In this work, we a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4731d0beccbf6926208c98681d5a6734
https://doi.org/10.1007/978-3-030-41005-6_6
https://doi.org/10.1007/978-3-030-41005-6_6
Autor:
Egor Shiryaev, Mikhail Babenko, Gleb Radchenko, Elena Golimblevskaia, Vanessa Miranda-Lopez, Andrei Tchernykh, Raul Rivera-Rodriguez, Arutyun Avetisyan, Viktor Andreevich Kuchukov, Maxim Deryabin, El-Ghazali Talbi
Publikováno v:
HPCS
Cloud storages delivered as services are made available to the general public. As cloud storage provider prices become low, they have moved into the mainstream of storage technology. However, there are various factors that cause many potential users
Autor:
Viktor Andreevich Kuchukov, Andrei Tchernykh, Vanessa Miranda-Lopez, Gleb Radchenko, Raul Rivera-Rodriguez, Mikhail Babenko, Arutyun Avetisyan
Publikováno v:
IPDPS Workshops
Despite all the benefits a cloud data storages offer to customers, there is a high risk of breach of confidentiality, integrity, and availability related with the uncertainty of errors and falsifications, loss of information, denial of access for a l