Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
FogIoHT: A weighted majority game theory based energy-efficient delay-sensitive fog network for internet of health things
Abstract Internet of Health Things (IoHT) has become a demanding application of Internet of
Things and cloud computing. In IoHT, the exchange and processing of health data are …
Things and cloud computing. In IoHT, the exchange and processing of health data are …
Network security in cloud computing with elliptic curve cryptography
This paper researches on cloud computing based-on authentication for the security
verification using Elliptic Curve Digital Signature Algorithm (ECDSA). The study structure …
verification using Elliptic Curve Digital Signature Algorithm (ECDSA). The study structure …
An effective hybrid encryption algorithm for ensuring cloud data security
V Goyal, C Kant - Big data analytics: Proceedings of CSI 2015, 2018 - Springer
Cloud computing is one of the most research hot topics in IT industry nowadays. A lot of
startup organizations are adopting cloud eagerly due to massive cloud facilities available …
startup organizations are adopting cloud eagerly due to massive cloud facilities available …
Authentication and encryption in cloud computing
JP Singh, S Kumar - 2015 International conference on smart …, 2015 - ieeexplore.ieee.org
Cloud Computing is becoming increasingly popular day by day. If the security parameters
are taken care properly many enterprises and government agencies will move into cloud …
are taken care properly many enterprises and government agencies will move into cloud …
Data encryption framework model with watermark security for data storage in public cloud model
D Boopathy, M Sundaresan - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
Cloud computing technology is a new concept of providing dramatically scalable and
virtualized resources. It implies a SOA (Service Oriented Architecture) type, reduced …
virtualized resources. It implies a SOA (Service Oriented Architecture) type, reduced …
A novel key management protocol for vehicular cloud security
Vehicular cloud computing (VCC) is a new hybrid technology which has become an
outstanding area of research. VCC combines salient features of cloud computing and …
outstanding area of research. VCC combines salient features of cloud computing and …
Enhancing security of cloud computing by using RC6 encryption algorithm
SA Abbas, MQ Mohammed - International Journal of Applied Information …, 2017 - ijais.org
Cloud computing give an impression of being an extremely well known and famous
computing technology. Each person is utilizing cloud computing straightforwardly or …
computing technology. Each person is utilizing cloud computing straightforwardly or …
Data security and encryption technique for cloud storage
In the last few years, we have seen that cloud computing model has been developed as a
promising business model of the fastest growing IT sector. Most of the IT companies …
promising business model of the fastest growing IT sector. Most of the IT companies …
Improved data storage confidentiality in cloud computing using identity-based cryptography
H Guesmi, LA Saïdane - 2017 25th international conference on …, 2017 - ieeexplore.ieee.org
This paper addresses the users' need to trust the commercial cloud providers and the
security issues related to data storage in a cloud storage service. The cloud storage is one of …
security issues related to data storage in a cloud storage service. The cloud storage is one of …
Fog–driven healthcare framework for security analysis
S Parasuraman, AK Sangaiah - … Intelligence for Multimedia Big Data on the …, 2018 - Elsevier
Motivation: Chronic diseases such as stroke, diabetes, cancer, kidney disease, and heart
disease are steadily increasing day-to-day. Providing proper precautions on time is needed …
disease are steadily increasing day-to-day. Providing proper precautions on time is needed …