Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 229,892,835 papers from all fields of science
Search
Sign In
Create Free Account
Convergent encryption
Convergent encryption, also known as content hash keying, is a cryptosystem that produces identical ciphertext from identical plaintext files. This…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Bitcasa
Ciphertext
Cloud computing
Cloud storage
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Survey paper- Distributed Duplication Of Data And Reliability
Vijayalaxmi Bhisikar
2017
Corpus ID: 63862891
2016
2016
A novel scheme for authenticated secured de-duplication with identity based encryption in cloud
Reshma N.S
,
G. N. Gopal
,
Sreeraag G
International Conference on Interaction Sciences
2016
Corpus ID: 15645816
De-duplication is a common methodology which is been used for eliminating out the similar copies of same or repeating data in…
Expand
Review
2016
Review
2016
A Survey on Data Redundancy Check in a Hybrid Cloud by using Convergent Encryption
N. Rani
,
S. R. Kumar
,
Prem Kumar
2016
Corpus ID: 61979780
Background/Objectives: Data deduplication is the elimination of redundant data within an existing environment. It is mainly used…
Expand
2015
2015
Distribution of interpolation points of maximally convergent multipoint Padé approximants
H. Blatt
,
R. Kovacheva
Journal of Approximation Theory
2015
Corpus ID: 32874120
2009
2009
3DNBS: A Data De-duplication Disk-Based Network Backup System
Tianming Yang
,
D. Feng
,
Jingning Liu
,
Yaping Wan
,
Zhongying Niu
,
Yuchang Ke
IEEE International Conference on Networking…
2009
Corpus ID: 13489600
Traditionally, backup and archiving have been performed on tapes. With the rapid advances in disk storage technology witnessed in…
Expand
2007
2007
Convergent SparseDT topology control protocol in dense sensor networks
Chengdong Jiang
,
Guoliang Chen
Scalable Information Systems
2007
Corpus ID: 17484598
When a sensor network is deployed for monitoring a protected region, topology control is usually used to save energy consumption…
Expand
1995
1995
Some results on convergent unlearning algorithm
S. A. Semenov
,
Irina B. Shuvalova
Neural Information Processing Systems
1995
Corpus ID: 8703903
In this paper we consider probabilities of different asymptotics of convergent unlearning algorithm for the Hopfield-type neural…
Expand
1973
1973
Performance comparison of a lobed-daisy mixer nozzle with a convergent nozzle at subsonic speeds
D. L. Maiden
1973
Corpus ID: 107627637
An investigation to determine the performance, in terms of thrust minus nozzle axial force, of a lobed-daisy mixer nozzle has…
Expand
1973
1973
Nonlinear difference schemes for linear partial differential equations
P. Gerber
,
W. Miranker
Computing
1973
Corpus ID: 27264372
We discuss a nonlinear difference scheme for approximating the solution of the initial value problem for linear partial…
Expand
1971
1971
ECOULEMENT DE PLASMA SANS COLLISIONS AUTOUR D'UN CYLINDRE
G. Fournier
1971
Corpus ID: 98121630
The Vlssov-Poisson equat ions a r e solved by a nonres t r i c t ive hybrid calculat i o n . Over and above known phenomena, r e…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE