Implementation of Cryptographic Approaches in Proposed Secure Framework in Cloud Environment
暂无分享,去创建一个
[1] Sultan Almuhammadi,et al. A comparative analysis of AES common modes of operation , 2017, 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE).
[2] Eli Biham,et al. New Attacks on IDEA with at Least 6 Rounds , 2013, Journal of Cryptology.
[3] Manoj Tyagi,et al. A Framework for Data Storage Security in Cloud , 2018 .
[4] Young-Sik Jeong,et al. A survey on cloud computing security: Issues, threats, and solutions , 2016, J. Netw. Comput. Appl..
[5] Ahmad Hamad,et al. Evaluation of the RC4 Algorithm for Data Encryption , 2006, Int. J. Comput. Sci. Appl..
[6] Don Coppersmith,et al. The Data Encryption Standard (DES) and its strength against attacks , 1994, IBM J. Res. Dev..
[7] Aleksandr Ometov,et al. Multi-Factor Authentication: A Survey , 2018, Cryptogr..
[8] Stephen M. Matyas,et al. A proposed mode for triple-DES encryption , 1996, IBM J. Res. Dev..
[9] James Miller,et al. A Survey and Analysis of Current CAPTCHA Approaches , 2013, J. Web Eng..
[10] Faraz Fatemi Moghaddam,et al. A scalable and efficient user authentication scheme for cloud computing environments , 2014, 2014 IEEE REGION 10 SYMPOSIUM.
[11] W. Wan,et al. Research and realization based on hybrid encryption algorithm of improved AES and ECC , 2010, 2010 International Conference on Audio, Language and Image Processing.
[12] Rasha Subhi Ali,et al. Enhancement CAST block algorithm to encrypt big data , 2017, 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT).
[13] Imad Fakhri Al-Shaikhli,et al. Cryptographic Hash Function: A High Level View , 2013, 2013 International Conference on Informatics and Creative Multimedia.
[14] ParkJong Hyuk,et al. A survey on cloud computing security , 2016 .
[15] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[16] Abdallah Karakra,et al. A-RSA: Augmented RSA , 2016, 2016 SAI Computing Conference (SAI).
[17] Araceli Queiruga Dios,et al. Security and Practical Considerations When Implementing the Elliptic Curve Integrated Encryption Scheme , 2015, Cryptologia.
[18] Hassan M. Elkamchouchi,et al. A modified serpent based algorithm for image encryption , 2018, 2018 35th National Radio Science Conference (NRSC).