咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 1 篇 task offloading
  • 1 篇 viber
  • 1 篇 virtual environm...
  • 1 篇 attributeqbased
  • 1 篇 blockchain
  • 1 篇 forensic
  • 1 篇 fog computing
  • 1 篇 computing
  • 1 篇 inverted
  • 1 篇 root
  • 1 篇 industrial metav...
  • 1 篇 cloud
  • 1 篇 android
  • 1 篇 index
  • 1 篇 homomorphic
  • 1 篇 encryption
  • 1 篇 edge computing
  • 1 篇 searchable

机构

  • 1 篇 information engi...
  • 1 篇 school of comput...
  • 1 篇 the insight cent...
  • 1 篇 department of el...
  • 1 篇 laboratory of re...
  • 1 篇 school of comput...
  • 1 篇 department of co...
  • 1 篇 security divisio...
  • 1 篇 school of comput...
  • 1 篇 university colle...

作者

  • 2 篇 tahar kechadi
  • 1 篇 n.-a. le-khac
  • 1 篇 sahraoui dhelim
  • 1 篇 liming chen
  • 1 篇 fateh boucenna
  • 1 篇 muhammad faheem
  • 1 篇 nyothiri aung
  • 1 篇 luigi atzori
  • 1 篇 samir kechid
  • 1 篇 omar nouali
  • 1 篇 m.tahar kechadi
  • 1 篇 huansheng ning

语言

  • 3 篇 英文
检索条件"作者=m.Tahar Kechadi"
3 条 记 录,以下是1-10 订阅
排序:
Secure Inverted Index Based Search over Encrypted Cloud Data with User Access Rights management
收藏 引用
Journal of Computer Science & Technology 2019年 第1期34卷 133-154页
作者: Fateh Boucenna Omar Nouali Samir Kechid m.tahar kechadi Security Division Research Center for Scientific and Technical InformationAlgiers 16028Algeria Laboratory of Research in Artificial Intelligence Department of Computer ScienceUniversity of Sciences and Technology H Suari B oumedieneAlgiers 16111Algeria The Insight Centre Unversity College DublinDublinDO4 VIW8Ireland
Cloud computing is a technology that provides users with a large storage space and an enormous computing ***,the outsourced data are often sensitive and confidential,and hence must be encrypted before being ***,classi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Edge-Enabled metaverse:The Convergence of metaverseand mobile Edge Computing
收藏 引用
Tsinghua Science and Technology 2024年 第3期29卷 795-805页
作者: Nyothiri Aung Sahraoui Dhelim Liming Chen Huansheng Ning Luigi Atzori tahar kechadi Information Engineering College Xinjiang Institute of EngineeringUrumqi 830023Chinaand also with School of Computer ScienceUniversity College DublinDublinD04 V1W8Ireland School of Computing Ulster UniversityBelfastBT151EDUK School of Computer and Communication Engineering University of Science and Technology BeijingBeijing 100083China Department of Electrical and Electronic Engineering University of CagliariSardinia 09124Italy School of Computer Science University College DublinDublinD04 V1W8Ireland
metaverse is a virtual environment where users are represented by their avatars to navigate a virtual world having strong links with its physical *** state-of-the-art metaverse architectures rely on a cloud-based appr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Smartphone Forensic Analysis: A Case Study for Obtaining Root Access of an Android Samsung S3 Device and Analyse the Image without an Expensive Commercial Tool
收藏 引用
Journal of Information Security 2014年 第3期5卷 83-90页
作者: muhammad Faheem N.-A. Le-Khac tahar kechadi Department of Computer Science Abdul Wali Khan University Mardan Mardan Pakistan University College Dublin Dublin Ireland
Smartphone is a very useful and compact device that fits in person’s pocket, but at the same time it can be used as a tool for criminal activities. In this day and age, people increasingly rely on smart phones rather... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论