Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[PDF][PDF] Cloud data security and various cryptographic algorithms
Cloud computing has spread widely among different organizations due to its advantages,
such as cost reduction, resource pooling, broad network access, and ease of administration …
such as cost reduction, resource pooling, broad network access, and ease of administration …
A comprehensive literature of genetics cryptographic algorithms for data security in cloud computing
Cloud computing has revolutionized the world, opening up new horizons with bright
potential due to its performance, accessibility, low cost, and many other benefits. Cloud …
potential due to its performance, accessibility, low cost, and many other benefits. Cloud …
Securing Digital Images through Simple Permutation‐Substitution Mechanism in Cloud‐Based Smart City Environment
Data security plays a significant role in data transfer in cloud‐based smart cities. Chaotic
maps are commonly used in designing modern cryptographic applications, in which one …
maps are commonly used in designing modern cryptographic applications, in which one …
[HTML][HTML] Applying detection leakage on hybrid cryptography to secure transaction information in e-commerce apps
M Al-Zubaidie, GS Shyaa - Future Internet, 2023 - mdpi.com
Technology advancements have driven a boost in electronic commerce use in the present
day due to an increase in demand processes, regardless of whether goods, products …
day due to an increase in demand processes, regardless of whether goods, products …
Data security techniques in cloud computing based on machine learning algorithms and cryptographic algorithms: Lightweight algorithms and genetics algorithms
Cloud computing (CC) refers to the on‐demand availability of network resources, particularly
data storage and processing power, without requiring special or direct administration by …
data storage and processing power, without requiring special or direct administration by …
A robust security scheme based on enhanced symmetric algorithm for MQTT in the Internet of Things
Message Queuing Telemetry Transport (MQTT) is expected to be the de facto messaging IoT
standard. Therefore, MQTT must achieve efficient security. Nevertheless, the most significant …
standard. Therefore, MQTT must achieve efficient security. Nevertheless, the most significant …
Novel framework based on ensemble classification and secure feature extraction for COVID-19 critical health prediction
The Covid outbreak necessitated the use of an automated method for treating patients with
critical symptoms. Increasing use of the Internet of Things (IoT) and smart devices requires …
critical symptoms. Increasing use of the Internet of Things (IoT) and smart devices requires …
An analytical survey of wsns integration with cloud and fog computing
Wireless sensor networks (WSNs) are spatially scattered networks equipped with an
extensive number of nodes to check and record different ecological states such as humidity …
extensive number of nodes to check and record different ecological states such as humidity …
[HTML][HTML] Providing security for flash loan system using cryptocurrency wallets supported by XSalsa20 in a blockchain environment
The days of long lines at banks and piles of paperwork are long gone. The lending
landscape has been completely transformed by digital loans, which provide a quick, easy …
landscape has been completely transformed by digital loans, which provide a quick, easy …
Post-quantum cryptography-driven security framework for cloud computing
Data security in the cloud has been a major issue since the inception and adoption of cloud
computing. Various frameworks have been proposed, and yet data breach prevails. With …
computing. Various frameworks have been proposed, and yet data breach prevails. With …