Securing Multimedia by Using DNA-Based Encryption in the Cloud Computing Environment
暂无分享,去创建一个
Suyel Namasudra | Rupak Chakraborty | Nageswara Rao Moparthi | Abhishek Majumder | Abhishek Majumder | S. Namasudra | Rupak Chakraborty
[1] Deka Ganesh Chandra,et al. Library Automation in Cloud , 2013, 2013 5th International Conference on Computational Intelligence and Communication Networks.
[2] S. Namasudra,et al. CLOUD COMPUTING: A NEW ERA , 2018 .
[3] Suyel Namasudra,et al. Taxonomy of DNA-Based Security Models , 2018, Advances of DNA Computing in Cryptography.
[4] Rajkumar Buyya,et al. CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms , 2011, Softw. Pract. Exp..
[5] A Leier,et al. Cryptography with DNA binary strands. , 2000, Bio Systems.
[6] Rizwan Patan,et al. Security, Privacy, Trust, and Anonymity , 2018, Advances of DNA Computing in Cryptography.
[7] D. Richard Kuhn,et al. Role-Based Access Controls , 2009, ArXiv.
[8] Catherine Taylor Clelland,et al. Hiding messages in DNA microdots , 1999, Nature.
[9] Christof Paar,et al. A New Class of Collision Attacks and Its Application to DES , 2003, FSE.
[10] Suyel Namasudra,et al. Data Access Control in the Cloud Computing Environment for Bioinformatics , 2021 .
[11] Westone,et al. Home Page , 2004, 2022 2nd International Conference on Intelligent Cybernetics Technology & Applications (ICICyTA).
[12] Abdul Hanan Abdullah,et al. Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence , 2014 .
[13] Suyel Namasudra,et al. Introduction of DNA Computing in Cryptography , 2018, Advances of DNA Computing in Cryptography.
[14] Guoyin Wang,et al. Survey on cloud model based similarity measure of uncertain concepts , 2019, CAAI Trans. Intell. Technol..
[15] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[16] Decoy Document Deployment for Effective Masquerade Attack Detection , 2011, DIMVA.
[17] Seifedine Kadry,et al. A Boosting-Aided Adaptive Cluster-Based Undersampling Approach for Treatment of Class Imbalance Problem , 2020, Int. J. Data Warehous. Min..
[18] José Luis Vázquez-Poletti,et al. Provisioning data analytic workloads in a cloud , 2013, Future Gener. Comput. Syst..
[19] Zhang Xun-cai. New Direction of Data Storage:DNA Molecular Storage Technology , 2006 .
[20] C. Martin. 2015 , 2015, Les 25 ans de l’OMC: Une rétrospective en photos.
[21] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[22] L. Miles,et al. 2000 , 2000, RDH.
[23] Pinki Roy,et al. Time saving protocol for data accessing in cloud computing , 2017, IET Commun..
[24] Yada Zhu,et al. Social Phishing , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[25] Guozhen Xiao,et al. Symmetric-key cryptosystem with DNA technology , 2007, Science in China Series F: Information Sciences.
[26] Suyel Namasudra,et al. Applications and Future Trends of DNA Computing , 2018, Advances of DNA Computing in Cryptography.
[27] Suyel Namasudra,et al. An improved attribute‐based encryption technique towards the data security in cloud computing , 2019, Concurr. Comput. Pract. Exp..
[28] Pinki Roy,et al. Cloud Computing: Fundamentals and Research Issues , 2017, 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM).
[29] Akimitsu Okamoto,et al. Public-key system using DNA as a one-way function for key distribution. , 2005, Bio Systems.
[30] A. Azzouz. 2011 , 2020, City.
[31] S. M. García,et al. 2014: , 2020, A Party for Lazarus.
[32] Pinki Roy,et al. A New Table Based Protocol for Data Accessing in Cloud Computing , 2017, J. Inf. Sci. Eng..
[33] Guangzhao Cui,et al. Hiding Messages Based on DNA Sequence and Recombinant DNA Technique , 2019, IEEE Transactions on Nanotechnology.
[34] Ganesh Chandra Deka,et al. Advances of DNA Computing in Cryptography , 2018 .
[35] A. Shanthini,et al. Towards DNA based data security in the cloud computing environment , 2020, Comput. Commun..
[36] Li Gong,et al. Optimal authentification protocols resistant to password guessing attacks , 1995, Proceedings The Eighth IEEE Computer Security Foundations Workshop.
[37] Pinki Roy,et al. PpBAC: Popularity Based Access Control Model for Cloud Computing , 2018, J. Organ. End User Comput..
[38] Jaya Jeswani,et al. Activity Based Access Control Model for Cloud Computing , 2015 .
[39] Abhishek Majumder,et al. Profile based access control model in cloud computing environment , 2014, 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE).
[40] Masakatu Morii,et al. One-Time Password Authentication Scheme to Solve Stolen Verifier Problem , 2011 .
[41] Rich Kaestner,et al. The Basics of Cloud Computing. , 2012 .
[42] Pinki Roy,et al. Data accessing based on the popularity value for cloud computing , 2017, 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS).
[43] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[44] Rui Li,et al. Advances on QoS-aware web service selection and composition with nature-inspired computing , 2019, CAAI Trans. Intell. Technol..
[45] Bin Wang,et al. Reversible Data Hiding Based on DNA Computing , 2017, Comput. Intell. Neurosci..
[46] S. Sitharama Iyengar,et al. Index Generation and Secure Multi-User Access Control over an Encrypted Cloud Data , 2016 .
[47] Pinki Roy,et al. Secure and efficient data access control in cloud computing environment: A survey , 2016, Multiagent Grid Syst..
[48] Florence March,et al. 2016 , 2016, Affair of the Heart.
[49] Rasim M. Alguliyev,et al. Efficient algorithm for big data clustering on single machine , 2020, CAAI Trans. Intell. Technol..
[50] Ganesh Chandra Deka,et al. The Revolution of Blockchain: State-of-the-Art and Research Challenges , 2020, Archives of Computational Methods in Engineering.