Enhanced cloud data security using AES algorithm
暂无分享,去创建一个
[1] Shadi R. Masadeh,et al. A comparison of data encryption algorithms with the proposed algorithm: Wireless security , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.
[2] Jaime Raigoza,et al. Evaluating Performance of Symmetric Encryption Algorithms , 2016, 2016 International Conference on Computational Science and Computational Intelligence (CSCI).
[3] R. Umarani,et al. A Survey on Various Most Common Encryption Techniques , 2012 .
[4] Obulam Suguna Mani,et al. A New Method in Symmetric Encryption for block cipher module: A Bit Shifting Approach , 2012 .
[5] M. Hadhoud,et al. A New Method in Symmetric Encryption for block cipher module : A Bit Shifting Approach , 2011 .
[7] Maged Hamada Ibrahim,et al. A Method for Obtaining Deniable Public-Key Encryption , 2009, Int. J. Netw. Secur..
[8] S. Durga Bhavani,et al. A Modified Hill Cipher Involving Interweaving and Iteration , 2010, Int. J. Netw. Secur..
[9] R. Kaur,et al. Effective Symmetric Key Block Ciphers Technique for Data Security: RIJNDAEL , 2014 .
[10] R. Radhakrishnan,et al. An improved log-based scheduling and load balancing in computational grid , 2015 .
[11] Cong Wang,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[12] Mohey M. Hadhoud,et al. Evaluating The Performance of Symmetric Encryption Algorithms , 2010, Int. J. Netw. Secur..
[13] Shaikh Abdul Hannan,et al. A Review on Classical and Modern Encryption Techniques , 2014 .
[14] Julian R. Ullmann,et al. An Algorithm for Subgraph Isomorphism , 1976, J. ACM.
[15] Akash Kanthale,et al. Survey on Cloud Computing Security Algorithms , 2016 .
[16] Anupama Mishra,et al. ENHANCING SECURITY OF CAESAR CIPHER USING DIFFERENT METHODS , 2013 .
[17] R. Sandhya,et al. Dynamic load balancing for cloud partition in public cloud model using VISTA scheduler algorithm , 2016 .
[18] Parsi Kalpana,et al. Data Security in Cloud Computing using RSA Algorithm , 2012 .
[19] Sudhansu Ranjan Lenka,et al. Enhancing Data Security in Cloud Computing Using RSA Encryption and MD5 Algorithm , 2014 .
[20] D Srinivasarao,et al. ANALYZING THE SUPERLATIVE SYMMETRIC CRYPTOGRAPHIC ENCRYPTION ALGORITHM ( ASCEA) , 2011 .