Efficient secure data retrieval on cloud using multi-stage authentication and optimized blowfish algorithm
暂无分享,去创建一个
[1] P. G. Student,et al. Data Security in Federated Cloud Environment using Homomorphic Encryption Technique , 2015 .
[2] Helmut Knebl,et al. Introduction to Cryptography , 2002, Information Security and Cryptography.
[3] Pin-Chang Su,et al. The application of multi-server authentication scheme in internet banking transaction environments , 2020, Information Systems and e-Business Management.
[4] S. Albert Rabara,et al. Elliptic Curve Cryptography Based Security Framework for Internet of Things (IoT) Enabled Smart Card , 2017, 2017 World Congress on Computing and Communication Technologies (WCCCT).
[5] V. Vasudevan,et al. A fully homomorphic–elliptic curve cryptography based encryption algorithm for ensuring the privacy preservation of the cloud data , 2018, Cluster Computing.
[6] Mohit Bhansali,et al. Enhancing Cloud Computing Security using AES Algorithm , 2013 .
[7] S. Sathappan,et al. A Secure Cloud Data Storage Combining DNA Structure and Multi-aspect Time-Integrated Cut-off Potential , 2018 .
[8] V. D. Shinde,et al. Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI , 2015 .
[9] Johannes A. Buchmann,et al. Introduction to Cryptography , 2001 .
[10] Mohammad E. Khodayar,et al. Energy-aware cloud computing , 2018 .
[11] Abdelrahman M. Helmi,et al. A framework for integrating geospatial information systems and hybrid cloud computing , 2018, Comput. Electr. Eng..
[12] P. Vijaya Karthick,et al. Enhancing Data Security in Cloud Computing Using Threshold Cryptography Technique , 2020 .
[13] S. Sangeetha,et al. A group-key-based sensitive attribute protection in cloud storage using modified random Fibonacci cryptography , 2020, Complex & Intelligent Systems.
[14] R.K. Meyers,et al. An Implementation of the Blowfish Cryptosystem , 2008, 2008 IEEE International Symposium on Signal Processing and Information Technology.
[15] Gopal Sarma Pingali,et al. Industry Cloud - Effective Adoption of Cloud Computing for Industry Solutions , 2014, 2014 IEEE 7th International Conference on Cloud Computing.
[16] Rayapati Venkata Sudhakar,et al. Security aware index based quasi–identifier approach for privacy preservation of data sets for cloud applications , 2020, Cluster Computing.
[17] Mohit Kumar,et al. A comprehensive survey for scheduling techniques in cloud computing , 2019, J. Netw. Comput. Appl..
[18] Javier Bajo,et al. Survey of agent-based cloud computing applications , 2019, Future Gener. Comput. Syst..
[19] Giancarlo Fortino,et al. Secure distributed adaptive bin packing algorithm for cloud storage , 2019, Future Gener. Comput. Syst..
[20] Kanika Lakhani,et al. Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing , 2010, 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010).
[21] Rongfang Bie,et al. Blockchain-enabled digital rights management for multimedia resources of online education , 2019, Multimedia Tools and Applications.
[22] G. Mahadevan,et al. Authorization for secured cloud storage through SHA-256 , 2019 .
[23] Yaghoub Farjami,et al. MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption , 2020, Journal of Ambient Intelligence and Humanized Computing.
[24] Diego F. Aranha,et al. PUF-Based Mutual Multifactor Entity and Transaction Authentication for Secure Banking , 2015, LightSec.
[25] P. Varalakshmi,et al. Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud , 2018, Cluster Computing.
[26] Chunming Rong,et al. Accountable Privacy-Preserving Mechanism for Cloud Computing Based on Identity-Based Encryption , 2018, IEEE Access.
[27] Choong Seon Hong,et al. Defense technique against spoofing attacks using reliable ARP table in cloud computing environment , 2015, 2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS).
[28] Shaji Ramaswamy Swarnammal,et al. A secure transaction of cloud data using conditional source trust attributes encryption mechanism , 2018, Soft Comput..
[29] Ling Tian,et al. Identity-Based Authentication for Cloud Computing , 2009, CloudCom.
[30] Subash Chandra Bose,et al. Design a secure and efficient health record transaction utilizing block chain (SEHRTB) algorithm for health record transaction in block chain , 2019 .