LBCLCT: Location Based Cross Language Cipher Technique
暂无分享,去创建一个
[1] Rini Marwati,et al. APLIKASI KRIPTOGRAFI KOMPOSISI ONE TIME PAD CIPHER DAN AFFINE CIPHER , 2017 .
[2] Parul Agarwal,et al. Secure keyword search using dual encryption in cloud computing , 2020 .
[3] Yashpalsingh Rajput,et al. An Improved Cryptographic Technique to Encrypt Text using Double Encryption , 2014 .
[4] Rahul Johari,et al. Triplicative Cipher Technique , 2016 .
[5] Christopher Brown. Guest Editorial Special Issue: High-Level Programming for Heterogeneous Parallel Systems , 2018, International Journal of Parallel Programming.
[6] Song Han,et al. New proxy signatures with message recovery using pairing , 2006 .
[7] Salimur Choudhury,et al. Dominating Set Algorithms for Wireless Sensor Networks Survivability , 2018, IEEE Access.
[8] Satish V. Ukkusuri,et al. Urban activity pattern classification using topic models from online geo-location data , 2014 .
[9] Sara Makki,et al. Fraud Data Analytics Tools and Techniques in Big Data Era , 2017, 2017 International Conference on Cloud and Autonomic Computing (ICCAC).
[10] Rahul Johari,et al. CLCT: Cross Language Cipher Technique , 2015, SSCC.
[11] Yonghuai Liu,et al. Human consistency evaluation of static video summaries , 2018, Multimedia Tools and Applications.
[12] Fadi Al-Turjman,et al. Confidential smart-sensing framework in the IoT era , 2018, The Journal of Supercomputing.
[13] Ali Khajeh-Hosseini,et al. Research Agenda in Cloud Technologies , 2010, ArXiv.
[14] Fadi Al-Turjman,et al. 5G/IoT-enabled UAVs for multimedia delivery in industry-oriented applications , 2018, Multimedia Tools and Applications.
[15] Yong Wu. Improvement Research Based on Affine Encryption Algorithm , 2015, 2015 14th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES).
[16] Rahul Johari,et al. SOAiCE: Simulation of Attacks in Cloud Computing Environment , 2018, 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence).
[17] Arun Kumar Yadav,et al. Global host allocation policy for virtual machine in cloud computing , 2018 .
[18] Rahul Johari,et al. C3T: Cloud based Cyclic Cryptographic Technique and it’s comparative analysis with classical cipher techniques , 2018, 2018 5th International Conference on Signal Processing and Integrated Networks (SPIN).
[19] Rahul Johari,et al. SCLCT: Secured cross language cipher technique , 2017, 2017 International Conference on Computing, Communication and Automation (ICCCA).
[20] Ashraf Zia,et al. Identifying Key Challenges in Performance Issues in Cloud Computing , 2012 .
[21] Umesh Singh,et al. Security Testing and Assessment of Vulnerability Scanners in Quest of Current Information Security Landscape , 2016 .
[22] Ajit Singh,et al. Security concerns and countermeasures in cloud computing: a qualitative analysis , 2019 .
[23] Sinem Alturjman,et al. Context-Sensitive Access in Industrial Internet of Things (IIoT) Healthcare Applications , 2018, IEEE Transactions on Industrial Informatics.
[24] Fadi Al-Turjman,et al. Task scheduling in cloud‐based survivability applications using swarm optimization in IoT , 2018, Trans. Emerg. Telecommun. Technol..
[25] Fadi Al-Turjman,et al. A Novel Security Model for Cooperative Virtual Networks in the IoT Era , 2018, International Journal of Parallel Programming.
[26] Seyed A Shahrestani,et al. Cloud Computing: Security and Reliability Issues , 2013 .