Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Enhancing the security of cloud data using hybrid encryption algorithm
KR Sajay, SS Babu, Y Vijayalakshmi - Journal of Ambient Intelligence and …, 2019 - Springer
Cloud computing is a term which is employed to explain different concepts of computing that
includes several PCs linked through a real time network of communication such as internet …
includes several PCs linked through a real time network of communication such as internet …
HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud
P Chinnasamy, P Deepalakshmi - Journal of Ambient Intelligence and …, 2022 - Springer
Technology that is perfect is free of vulnerability. Technological growth offers users online
data storage and access to it from anywhere. Cloud computing is a model that provides data …
data storage and access to it from anywhere. Cloud computing is a model that provides data …
Issues and challenges in cloud storage architecture: a survey
From home appliances to industrial enterprises, the Information and Communication
Technology (ICT) industry is revolutionizing the world. We are witnessing the emergence of …
Technology (ICT) industry is revolutionizing the world. We are witnessing the emergence of …
[HTML][HTML] A novel effective lightweight homomorphic cryptographic algorithm for data security in cloud computing
Cloud computing is a technology in which the resources are delivered as services. Users
can access them anywhere, anytime via the Internet without any need to know the …
can access them anywhere, anytime via the Internet without any need to know the …
Design of secure storage for health-care cloud using hybrid cryptography
P Chinnasamy, P Deepalakshmi - 2018 second international …, 2018 - ieeexplore.ieee.org
More recently, any technology can't be stated perfect until it's totally free of any vulnerability.
There are many technologies has grown in day-to-day life that offer online data storage …
There are many technologies has grown in day-to-day life that offer online data storage …
[HTML][HTML] Encryption techniques for smart systems data security offloaded to the cloud
With technological advancement, cloud computing paradigms are gaining massive
popularity in the ever-changing technological advancement. The main objective of the cloud …
popularity in the ever-changing technological advancement. The main objective of the cloud …
Secure image encryption scheme based on fractals key with Fibonacci series and discrete dynamical system
M Khan, F Masood, A Alghafis - Neural Computing and Applications, 2020 - Springer
In this article, our aim is to design a new and efficient digital information confidentiality
mechanism. We have offered an encryption scheme which is based on fractals and multiple …
mechanism. We have offered an encryption scheme which is based on fractals and multiple …
EverSSDI: blockchain-based framework for verification, authorisation and recovery of self-sovereign identity using smart contracts
T Zhou, X Li, H Zhao - International Journal of Computer …, 2019 - inderscienceonline.com
In the current identity management process, the problems such as increasing differentiation
of digital identities, fragmentation and centralisation of identity information have been …
of digital identities, fragmentation and centralisation of identity information have been …
An efficient lightweight image encryption scheme using multichaos
With an immense increase in Internet multimedia applications over the past few years, digital
content such as digital images are stored and shared over global networks, the probability …
content such as digital images are stored and shared over global networks, the probability …
Analysis of the smoothing and payload distribution method on reversible audio steganography
MM Amrulloh, T Ahmad… - 2023 14th International …, 2023 - ieeexplore.ieee.org
Along with the rampant theft of confidential data, technological security systems are the most
important thing in the digitalization era. Data cannot be said to be safe from third parties …
important thing in the digitalization era. Data cannot be said to be safe from third parties …