Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,190,209 papers from all fields of science
Search
Sign In
Create Free Account
Data security
Known as:
Secure information
Data security means protecting data, such as a database, from destructive forces and from the unwanted actions of unauthorized users.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ATP Electronics
Application security
Backup
Base One Foundation Component Library (BFC)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2019
Highly Cited
2019
Ensure Hierarchal Identity Based Data Security in Cloud Environment
S. Kaushik
,
C. Gandhi
International Journal of Cloud Applications and…
2019
Corpus ID: 201881523
Cloud computing has emerged as a new promising field in the internet. It can be thought as a new architecture for the next…
Expand
Highly Cited
2018
Highly Cited
2018
An Aggregate Signature Based Trust Routing for Data Gathering in Sensor Networks
Jiawei Tang
,
Anfeng Liu
,
Ming Zhao
,
Tian Wang
Secur. Commun. Networks
2018
Corpus ID: 3418277
An Aggregate Signature based Trust Routing (ASTR) scheme is proposed to guarantee safe data collection in WSNs. In ASTR scheme…
Expand
Highly Cited
2017
Highly Cited
2017
Time efficient secure DNA based access control model for cloud computing environment
Suyel Namasudra
,
Pinki Roy
,
P. Vijayakumar
,
S. Audithan
,
B. Balusamy
Future generations computer systems
2017
Corpus ID: 7398981
Review
2012
Review
2012
Ethical Technology Use, Policy, and Reactions in Educational Settings
Kadir Beycioglu
2012
Corpus ID: 16903995
Kadir Beycioglu is a lecturer at Inonu University (Malatya, Turkey). He is the Editor-in-Chief of the International Journal of…
Expand
2010
2010
Anonymous Coexistence Proofs for RFID Tags
N. Lo
,
Kuo-Hui Yeh
Journal of information science and engineering
2010
Corpus ID: 8339219
In a world with RFID carriers everywhere, the coexistence proof of multiple RFID-tagged objects shown at the same time and the…
Expand
2005
2005
P2P Mobile Sensor Networks
S. Krco
,
D. Cleary
,
Daryl Parker
Proceedings of the Annual Hawaii International…
2005
Corpus ID: 2424112
Wireless sensor networks research is primarily focused on various internal sensor network issues like routing, self-organization…
Expand
Highly Cited
2004
Highly Cited
2004
Secure XML Publishing without Information Leakage in the Presence of Data Inference
Xiaochun Yang
,
Chen Li
Very Large Data Bases Conference
2004
Corpus ID: 8663466
Highly Cited
2004
Highly Cited
2004
Duplicate Data Elimination in a SAN File System
Bo Hong
,
D. Plantenberg
,
D. Long
,
M. Sivan-Zimet
IEEE Conference on Mass Storage Systems and…
2004
Corpus ID: 12290109
Duplicate Data Elimination (DDE) is our method for identifying and coalescing identical data blocks in Storage Tank, a SAN file…
Expand
Highly Cited
2001
Highly Cited
2001
Vertex-disjoint spanning trees of the star network with applications to fault-tolerance and security
A. A. Rescigno
Information Sciences
2001
Corpus ID: 35571543
1994
1994
Randomness in Distributed Protocols
C. Blundo
,
A. D. Santis
,
U. Vaccaro
International Colloquium on Automata, Languages…
1994
Corpus ID: 20110759
In this paper we give a systematic analysis of the amount of randomness needed by Secret Sharing Schemes and Secure Key…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE