DNA Data Storage and Hybrid Molecular–Electronic Computing

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Inner Workings: DNA for data storage and computing.

On the surface, genetic and electrical engineering appear to have little in common. One field revolves around carbon and the other is built upon silicon; one makes RNA from DNA and the other converts AC to DC. But some creative biologists have begun to apply the concepts of electrical engineering to living cells. “We view ourselves as biological programmers,” says Timothy Lu, a member of the Sy...

متن کامل

Data Storage in Cloud Computing

With the development of cloud computing, outsourcing data to cloud server attracts lots of attentions. To guarantee the security and achieve flexibly fine-grained file access control, attribute based encryption (ABE) was proposed and used in cloud storage system. However, user revocation is the primary issue in ABE schemes. In this article, we provide a ciphertextpolicy attribute based encrypti...

متن کامل

Data Storage in DNA

Human-beings have always been fond of accessing more and more information in minimum possible time and space. Consequently New Generation Computers and High Speed Internet have gained popularity in the recent years. We have been witness to remarkable achievements like the transition from the bulky hard-drives to the flash drives which has made personal data storage efficiently manageable. But w...

متن کامل

Secure Data Storage in Mobile Cloud Computing

In cloud computing highly scalable computing resources are supplied as an outer service through internet on pay-as-usability basis. Portio research [1] estimates that mobile subscribers will reach 6.5 billion by the end of 2012, 6.9 billion by the end of 2013. Due to increasing use of mobile devices the requirement of cloud computing in mobile devices arise, which gave birth to Mobile Cloud Com...

متن کامل

Identity-based data storage in cloud computing

Identity-based proxy re-encryption schemes have been proposed to shift the burden of managing numerous files from the owner to a proxy server. Nevertheless, the existing solutions suffer from several drawbacks. First, the access permission is determined by the central authority, which makes the scheme impractical. Second, they are insecure against collusion attacks. Finally, only queries from t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings of the IEEE

سال: 2019

ISSN: 0018-9219,1558-2256

DOI: 10.1109/jproc.2018.2875386