DssP: Efficient dual-server secret sharing protocol based on password authentication for cloud storage services

S Zhang, X Yong, M Luo, D He… - IEEE Systems …, 2021 - ieeexplore.ieee.org
Ensuring the security of cloud storage services is an ongoing challenge, due to the
increasingly complex and dynamic threat landscape. One particular challenge is how to …

RETRACTED ARTICLE: Integrative optimization with Qos using multi-level security in medical cloud

V Jaikumar, K Venkatachalapathy - Journal of Ambient Intelligence and …, 2021 - Springer
Cloud environment improves the utilization of spread sources by sharing them with others in
an open platform. Security is an important concern, since, the data is being managed by …

Euler totient function and fermat Euler theorem based an optimized key management scheme for securing mobile agents migration

P Kumar, N Singhal, D Pandey - International Journal of Information …, 2022 - Springer
As the mobile agents move automatically on distributed networks, the security of agents and
platforms is of prime concern. Over the year's mobile agents-based software applications …

Distributed secret sharing scheme based on the high-dimensional rotation paraboloid

S Qin, Z Tan, B Zhang, F Zhou - Journal of Information Security and …, 2021 - Elsevier
Secret sharing of (k, n)-threshold is naturally used to assist in security-assurance
applications in smart systems. It can ensure a high level of data security and reliability. Most …

[PDF][PDF] Bibliometric survey on zero-knowledge proof for authentication

A Pathak, T Patil, S Pawar, P Raut, S Khairnar… - Libr. Philos …, 2021 - academia.edu
ABSTRACT Background: Zero Knowledge Proof is a persuasive cryptographic protocol
employed to provide data security by kee** the user's identity, using the services …

Euler Totient Function and Fermat-Eulller Theorem Based on Optimized Key Management Scheme for Securing Mobile Agents Migration

N Singhal, P Kumar, D Pandey - Electronic Systems and Intelligent …, 2022 - Springer
As mobile agents move automatically on distributed networks, the security of agents and
platforms is of prime concern. Over the years, mobile agents-based software applications …