A Dynamic Four-Level Authentication Framework to Enhance Security in Public Cloud Using Hybrid Cellular Automata
暂无分享,去创建一个
[1] S. Shefali,et al. CELLULAR AUTOMATA FOR CRYPT-STEGANOGRAPHY , 2013 .
[2] L. Arockiam,et al. A Dynamic Two Stage Authentication Framework to Enhance Security in Public EduCloud , 2015 .
[3] Benjamin Fabian,et al. Topological analysis of cloud service connectivity , 2015, Comput. Ind. Eng..
[4] Chander Kant,et al. Enhanced Security Architecture for Cloud Data Security , 2013 .
[5] Chun-Ling Chang,et al. Cellular automata for edge detection of images , 2004, Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826).
[6] Petre Anghelescu,et al. FPGA Implementation of Hybrid Additive Programmable Cellular Automata Encryption Algorithm , 2008, 2008 Eighth International Conference on Hybrid Intelligent Systems.
[7] Gonzalo Álvarez,et al. Sharing secret color images using cellular automata with memory , 2003, ArXiv.
[8] L. Arockiam,et al. A Study of User Authentication Techniques in Cloud Computing , 2015 .
[9] Tiago Ferreto,et al. EduCloud: A private cloud tool for academic environments , 2012, 2012 IEEE Latin America Conference on Cloud Computing and Communications (LatinCloud).
[10] Yuan Zhou,et al. Encryption Based on Reversible Second-Order Cellular Automata , 2005, ISPA Workshops.
[11] Anwar Mohd. Mansuri,et al. Benefit of Cloud Computing for Educational Institutions and Online Marketing , 2014 .
[12] Ajantha Dahanayake,et al. Advances in Higher Educational Resource Sharing and Cloud Services for Ksa , 2015 .
[13] Peter Mell,et al. "The NIST Definition of Cloud Computing," Version 15 , 2009 .
[14] Ismail Amr Ismail,et al. A cryptosystem based on elementary cellular automata , 2013, Commun. Nonlinear Sci. Numer. Simul..
[15] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[16] Sawan Kumar,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[17] N. P. Gopalan,et al. EduCloud: A Dynamic Three Stage Authentication Framework to Enhance Security in Public Cloud , 2017 .
[18] Syed M. Rahman,et al. An exploratory analysis of the influence of information security on the adoption of cloud computing , 2013, 2013 8th International Conference on System of Systems Engineering.
[19] Jahangir Mohammed,et al. A Cellular Automata based Optimal Edge Detection Technique using Twenty-Five Neighborhood Model , 2013, ArXiv.
[20] A. Jaya Lakshmi,et al. Optimized and Secured Educlouds by Implementing Virtualization , 2012 .
[21] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[22] Lakshmi Sobhana Kalli,et al. Market-Oriented Cloud Computing : Vision , Hype , and Reality for Delivering IT Services as Computing , 2013 .
[23] Rohitash Kumar Banyal,et al. Multi-factor Authentication Framework for Cloud Computing , 2013, 2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation.
[24] N. P. Gopalan,et al. An Analytical Study of Cellular Automata and its Applications in Cryptography , 2017 .
[25] Prachi Soni,et al. Multi-factor Authentication Security Framework in Cloud Computing , 2015 .
[26] S. Wolfram,et al. Two-dimensional cellular automata , 1985 .
[27] John Viega,et al. Cloud Computing and the Common Man , 2009, Computer.
[28] Nureni Asafe Yekini,et al. Open Educational Resources (OER) for Sustainable Development using Autonomic Cloud Computing System , 2016 .
[29] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[30] J. Anitha,et al. International Conference on Intelligent Computing and Control Systems (ICICCS 2018) , 2018, 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS).
[31] Ziba Eslami,et al. A verifiable multi-secret sharing scheme based on cellular automata , 2010, Inf. Sci..
[32] Michael E. Whitman,et al. In defense of the realm: understanding the threats to information security , 2004, Int. J. Inf. Manag..
[33] M. A. Peer,et al. Digital Image Scrambling Based on Two Dimensional Cellular Automata , 2012 .