[PDF][PDF] Performance analysis of different cryptography algorithms
Data security has been a major concern in the today's information technology era. Especially
it becomes serious in the cloud environment because the data is located in different places …
it becomes serious in the cloud environment because the data is located in different places …
[PDF][PDF] Cryptography: Avalanche effect of AES and RSA
R Verma, AK Sharma - International Journal of Scientific and …, 2020 - academia.edu
Security is a major concern in the field of computer science. With the advancement in
technology security of data from theft has become a major obstacle. It is necessary to encrypt …
technology security of data from theft has become a major obstacle. It is necessary to encrypt …
[PDF][PDF] A comprehensive data security and forensic investigation framework for cloud-iot ecosystem
The rapid growth of cloud and IoT has various security associated issues that can withhold
its extensive acceptance. Based on this premise, this paper has presented comprehensive …
its extensive acceptance. Based on this premise, this paper has presented comprehensive …
Security Evaluation Methods and the used parameters for Some Cryptosystem
SB Sadkhan, SF Jawad - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
The evaluation process is a necessary process that must be performed by the designer to
help in avoiding any weakness which happens during the design stages. There are many …
help in avoiding any weakness which happens during the design stages. There are many …
A proposed ANFIS evaluator for RSA cryptosystem used in cloud networking
The security aspect is considered as the most important challenge in communication and
computer networks. Therefore the “security level evaluation” of cryptosystem, is very …
computer networks. Therefore the “security level evaluation” of cryptosystem, is very …
[PDF][PDF] Enhanced security using hybrid encryption algorithm
MK Neha - International Journal of Innovative Research in …, 2016 - scholar.archive.org
Information Security plays a major role in today's scenario. Cloud computing is a technology
that provides access to information and computing resources from anywhere that a network …
that provides access to information and computing resources from anywhere that a network …
[PDF][PDF] Evolving cryptographic approach for enhancing security of resource constrained mobile device outsourced data in cloud computing
K Kaviya, KK Shanthini, M Sujithra - International Journal of …, 2019 - researchgate.net
Mobile cloud computing in the increasing popularity among users of mobile device enables
to store their data in cloud. Security is the major concern when the sensitive information is …
to store their data in cloud. Security is the major concern when the sensitive information is …
Data security in cloud computing using a hybrid algorithm approach
Cloud computing is a technology that provides users with computing resources and storage.
It removes the need for businesses and institutes to maintain expensive computing facilities …
It removes the need for businesses and institutes to maintain expensive computing facilities …
Security evaluation of cryptosystems used in cloud networks
Cloud networking is the next generation architecture of IT. Clouds are very complex
architectures. They have a replicated thousands of times, and common functional units and …
architectures. They have a replicated thousands of times, and common functional units and …
Cost-effective solutions in cloud computing security
L Hasimi - … in Information & Knowledge Management for Business …, 2021 - Springer
The popularity and advances in technology, recently have created a great deal of interest in
cloud computing, especially for enterprises. Although the cloud computing platform offers a …
cloud computing, especially for enterprises. Although the cloud computing platform offers a …