Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Proxy re-encryption: Analysis of constructions and its application to secure access delegation
This paper analyzes the secure access delegation problem, which occurs naturally in the
cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from …
cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from …
Method and system to securely migrate and provision virtual machine images and content
Y Raghuram, S Orrin, AJ Munoz - US Patent 8,924,720, 2014 - Google Patents
BACKGROUND The use of cloud computing environments is being adopted at a rapid pace,
particularly by businesses. Software develop ment companies have introduced numerous …
particularly by businesses. Software develop ment companies have introduced numerous …
Comparison and search operations of encrypted data
Searching for desired data within an encrypted set of data (using a fully homomorphic
encryption) without decrypting the set of data. A lookup key is compared against a set of …
encryption) without decrypting the set of data. A lookup key is compared against a set of …
Enhancing Security of Sensor Data for a System Via an Embedded Controller
GA Stewart - US Patent App. 13/843,530, 2013 - Google Patents
BACKGROUND 0003 Increasingly, computers are under threat of mali cious tampering or
intrusion, eg, from unauthorized users, either locally or over networks. Identity theft, theft of …
intrusion, eg, from unauthorized users, either locally or over networks. Identity theft, theft of …
Customer call logging data privacy in cloud infrastructure
LP Papadopoulos, RN Dunn, AM Varghese - US Patent 10,250,385, 2019 - Google Patents
US10250385B2 - Customer call logging data privacy in cloud infrastructure - Google
Patents US10250385B2 - Customer call logging data privacy in cloud infrastructure …
Patents US10250385B2 - Customer call logging data privacy in cloud infrastructure …
Providing access control and identity verification for communications when initiating a communication to an entity to be verified
S Shaffer, Y Schwartz, AJ Shockley - US Patent 12,021,866, 2024 - Google Patents
The techniques herein are directed generally to providing access control and identity
verification for communications when initiating a communication to an entity to be verified. In …
verification for communications when initiating a communication to an entity to be verified. In …
Proxy re-encryption
This paper analyzes the secure access delegation problem, which occurs naturally in the
cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from …
cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from …
Homomorphic encryption based high integrity computing system
(57) ABSTRACT A homomorphic encryption based high integrity computing system
including a processing system including a single string computation channel configured to …
including a processing system including a single string computation channel configured to …
Method and system to securely migrate and provision virtual machine images and content
Y Ranghuram, S Orrin, AJ Munoz - US Patent 9,252,946, 2016 - Google Patents
US9252946B2 - Method and system to securely migrate and provision virtual machine
images and content - Google Patents US9252946B2 - Method and system to securely …
images and content - Google Patents US9252946B2 - Method and system to securely …
Providing access control and identity verification for communications when receiving a communication at an entity to be verified
S Shaffer, Y Schwartz, AJ Shockley - US Patent 11,637,827, 2023 - Google Patents
US11637827B2 - Providing access control and identity verification for communications
when receiving a communication at an entity to be verified - Google Patents …
when receiving a communication at an entity to be verified - Google Patents …