News
IGIS Tech Notes describe workflows and techniques for using geospatial science and technologies in research and extension.
In practice, incident response teams repeatedly encounter the same weaknesses. What are they and how can they be resolved?
To implement encrypted data deduplication in a cloud storage system, users must encrypt files using special encryption algorithms (e.g., convergent encryption (CE)), which cannot provide strong ...
As increasingly prevalent, more and more data are stored in the cloud storage, which brings us two major challenges. First, the modified files in the cloud should be quickly synchronized (sync) to ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results