largesse 发表于 2025-4-1 03:05:01
Blockchain-Based Access Control with Decentralized Architecture for Data Storage and Transfer,r (DU) generates a registration request that is sent to the data owner (DO). In order to ensure safe transmission, an EHR application implements a data protection procedure. The cloud infrastructure incorporates components such as data consumers, data producers, blockchain transactions, smart contra浓缩 发表于 2025-4-1 08:24:03
Effective Strategies for Resource Allocation and Scheduling in Cloud Computing,g energy consumption—all without breaching service-level agreements. Comparisons of proposed and established methods have been found to yield positive outcomes in experiments. The utilization rate has been identified in existing system is 88, but the proposed system rate is 88.82.incredulity 发表于 2025-4-1 12:09:11
http://reply.papertrans.cn/48/4714/471391/471391_63.png令人心醉 发表于 2025-4-1 18:17:11
CryptoDataMR: Enhancing the Data Protection Using Cryptographic Hash and Encryption/Decryption Thrority breaches. This paper presents a solution CryptoDataMR model to enhance data protection by implementing cryptographic hash and encryption/decryption algorithms in the MapReduce programming model. The proposed model uses a chain rolling double hash algorithm at the map layer and position-based sh向外供接触 发表于 2025-4-1 19:36:16
http://reply.papertrans.cn/48/4714/471391/471391_65.png马赛克 发表于 2025-4-2 02:19:01
http://reply.papertrans.cn/48/4714/471391/471391_66.png尽责 发表于 2025-4-2 04:46:40
http://reply.papertrans.cn/48/4714/471391/471391_67.png