Cloud computing platform: Performance analysis of prominent cryptographic algorithms
暂无分享,去创建一个
[1] S. U. Aswathy,et al. RETRACTED ARTICLE: A multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment , 2020, Journal of Ambient Intelligence and Humanized Computing.
[2] W. Budiharto,et al. Image Data Encryption Using DES Method , 2021, 2021 1st International Conference on Computer Science and Artificial Intelligence (ICCSAI).
[3] Olayiwola Abisola Ayomide,et al. A Cloud Computing Platform On File Storage And Sharing Using Rijndeal Algorithms , 2021 .
[4] Gunasekaran Manogaran,et al. FAST: Fast Accessing Scheme for data Transmission in cloud computing , 2021, Peer-to-Peer Netw. Appl..
[5] G. Sujatha,et al. Digital Data Identification for Deduplication Process using Cryptographic Hashing Techniques , 2021, 2021 International Conference on Intelligent Technologies (CONIT).
[6] Dilip Kumar Sharma,et al. Securing data in transit using data-in-transit defender architecture for cloud communication , 2021, Soft Computing.
[7] T. M.,et al. Enhanced DNA Cryptosystem for Secure Cloud Data Storage , 2021, 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC).
[8] Pulkit Kumar,et al. A Novel Approach for Security in Cloud Data Storage Using AES-DES-RSA Hybrid Cryptography , 2021, 2021 Emerging Trends in Industry 4.0 (ETI 4.0).
[9] Somchart Fugkeaw,et al. An Analytical Review of Data Access Control Schemes in Mobile Cloud Computing , 2021, Lecture Notes in Networks and Systems.
[10] M. Ali,et al. Applications of Cryptography in Database: A Review , 2021, 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS).
[11] K. Karibasappa,et al. Enhancing Data Protection in Cloud Computing using Key Derivation based on Cryptographic Technique , 2021, 2021 5th International Conference on Computing Methodologies and Communication (ICCMC).
[12] I. Tayubi,et al. Comparative Analysis of Security Algorithms used in Cloud Computing , 2021, 2021 8th International Conference on Computing for Sustainable Global Development (INDIACom).
[13] Preeti Saini,et al. Advanced Encryption Standard: Attacks and Current Research Trends , 2021, 2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE).
[14] Sina Besharat,et al. Security of internet of things based on cryptographic algorithms: a survey , 2021, Wireless Networks.
[15] Sudhir Jagtap,et al. Security analysis and performance evaluation of a new lightweight cryptographic algorithm for cloud computing , 2021, Global Transitions Proceedings.
[16] G. R. Gangadharan,et al. SecAuth-SaaS: a hierarchical certificateless aggregate signature for secure collaborative SaaS authentication in cloud computing , 2021, Journal of Ambient Intelligence and Humanized Computing.
[17] T. Jayasankar,et al. IoT enabled cancer prediction system to enhance the authentication and security using cloud computing , 2020, Microprocess. Microsystems.
[18] Ali Ghaffari,et al. Improving the security of internet of things using cryptographic algorithms: a case of smart irrigation systems , 2020, Journal of Ambient Intelligence and Humanized Computing.
[19] Khaled Shaalan,et al. Systematic Review on Fully Homomorphic Encryption Scheme and Its Application , 2020, Recent Advances in Intelligent Systems and Smart Applications.
[20] Karthik Subburathinam,et al. Implementation of enhanced blowfish algorithm in cloud environment , 2020, J. Ambient Intell. Humaniz. Comput..
[21] Azman Samsudin,et al. Using Blockchain in Cloud Computing to Enhance Relational Database Security , 2021, IEEE Access.
[22] Mayank Singh,et al. Cloud data security and various security algorithms , 2021 .
[23] Mhamad Bakro,et al. Performance Analysis of Cloud Computing Encryption Algorithms , 2021 .
[24] Kamel H. Rahouma,et al. Hybrid Cryptographic Approach to Safeguard Cloud Computing Services: A Survey , 2021, AMLTA.
[25] Haibo Hong,et al. A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices , 2021, Future Gener. Comput. Syst..
[26] R. Kalaiselvi. Custom-Aes: A Novel Framework To Enhance Data Security In Cloud Environment , 2021 .
[27] The "Essence" of Network Security: An End-to-End Panorama , 2021, Lecture Notes in Networks and Systems.
[28] Advin Manhar,et al. A Review on Cryptography in Cloud Computing , 2020 .
[29] Kamlesh Gupta,et al. Session key based fast, secure and lightweight image encryption algorithm , 2020, Multimedia Tools and Applications.
[30] Vijay K. Vasudevan,et al. Enhancing Blockchain security in cloud computing with IoT environment using ECIES and cryptography hash algorithm , 2020 .
[31] Sefer Kurnaz,et al. Internet Of Things And Cloud Computing - A Review , 2020, 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT).
[32] Doug Young Suh,et al. A Review of Machine Learning Algorithms for Cloud Computing Security , 2020, Electronics.
[33] Munesh Chandra Trivedi,et al. Encryption algorithm in cloud computing , 2020 .
[34] Mahesh Chandra Govil,et al. A Hybrid Symmetric Key Cryptography Method to Provide Secure Data Transmission , 2020, ICML 2020.
[35] Zahid Mehmood,et al. CryptoGA: a cryptosystem based on genetic algorithm for cloud data security , 2020, Cluster Computing.
[36] S. Sangeetha,et al. A group-key-based sensitive attribute protection in cloud storage using modified random Fibonacci cryptography , 2020, Complex & Intelligent Systems.
[37] Pan Jun Sun,et al. Security and privacy protection in cloud computing: Discussions and challenges , 2020, J. Netw. Comput. Appl..
[38] Alabi Orobosade,et al. Cloud Application Security using Hybrid Encryption , 2020 .
[39] Xiaodong Wang,et al. Security information transmission algorithms for IoT based on cloud computing , 2020, Comput. Commun..
[40] Abdullah Aljumah,et al. Cyber security threats, challenges and defence mechanisms in cloud computing , 2020, IET Commun..
[41] Latha Tamilselvan,et al. Elliptic curve Diffie–Hellman cryptosystem in big data cloud security , 2020, Cluster Computing.
[42] A. Shanthini,et al. Towards DNA based data security in the cloud computing environment , 2020, Comput. Commun..
[43] Gautam Srivastava,et al. An efficient public key secure scheme for cloud and IoT security , 2020, Comput. Commun..
[44] Malay Kule,et al. Prevention of the Man-in-the-Middle Attack on Diffie–Hellman Key Exchange Algorithm: A Review , 2020 .
[45] Bharat Mishra,et al. Implementation of Cryptographic Approaches in Proposed Secure Framework in Cloud Environment , 2020 .
[46] S. Padmavathi,et al. Efficient Data Security Using Hybrid Cryptography on Cloud Computing , 2020 .
[47] Rafat Karim,et al. Digital Signature Authentication for a Bank Using Asymmetric Key Cryptography Algorithm and Token Based Encryption , 2020 .
[48] Sura F. Yousif,et al. Implementation of El-Gamal algorithm for speech signals encryption and decryption , 2020 .
[49] B. B. Gupta,et al. Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things Network , 2020, Handbook of Computer Networks and Cyber Security.
[50] Performance Management of Integrated Systems and its Applications in Software Engineering , 2020, Asset Analytics.
[51] Suvanam Sasidhar Babu,et al. Enhancing the security of cloud data using hybrid encryption algorithm , 2019, Journal of Ambient Intelligence and Humanized Computing.
[52] Sumit Chaudhary,et al. Comparative Study Between Cryptographic and Hybrid Techniques for Implementation of Security in Cloud Computing , 2019, Asset Analytics.
[53] Parul Agarwal,et al. Secure keyword search using dual encryption in cloud computing , 2020 .
[54] Ariel M. Sison,et al. A New Approach in Expanding the Hash Size of MD5 , 2018, Int. J. Commun. Networks Inf. Secur..
[55] Kamal Kumar Chauhan,et al. Homomorphic Encryption for Data Security in Cloud Computing , 2015, 2015 International Conference on Information Technology (ICIT).
[56] Layuan Li,et al. Phased Scheduling for Resource-Constrained Mobile Devices in Mobile Cloud Computing , 2014, Wirel. Pers. Commun..
[57] Amritpal Singh,et al. COMPARATIVE ANALYSIS OF CRYPTOGRAPHIC ALGORITHMS , 2013 .
[58] Parsi Kalpana,et al. Data Security in Cloud Computing using RSA Algorithm , 2012 .
[59] Cong Wang,et al. Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.