Journal articles on the topic 'CLOUD OF SECRECY'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'CLOUD OF SECRECY.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Gosavi, Mr Abhijeet, Mr Sakib Shaikh, Mr Adnan Sayyed, Mr Somesh Sapa, Mr Ayan Shaikh, and Prof A. A. Pund. "Enabling Encrypted Cloud Emails with Data Encryption using Advanced Encryption Techniques." International Journal for Research in Applied Science and Engineering Technology 11, no. 6 (June 30, 2023): 864–69. http://dx.doi.org/10.22214/ijraset.2023.53709.
Full textAnjaneyulu, GSGN, Yogendra Singh Sisodiya, and Kumar Saurav. "Novel Composite Encryption for Secrecy in Cloud Computing." Research Journal of Pharmacy and Technology 9, no. 9 (2016): 1501. http://dx.doi.org/10.5958/0974-360x.2016.00292.4.
Full textRajkumar, N., and E. Kannan. "Attribute-Based Collusion Resistance in Group-Based Cloud Data Sharing using LKH Model." Journal of Circuits, Systems and Computers 29, no. 02 (May 9, 2019): 2030001. http://dx.doi.org/10.1142/s0218126620300019.
Full textK, Sudha, and Dr Umarani C. "Security Framework for Cloud Information under Transparency of a Key." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 1429–36. http://dx.doi.org/10.22214/ijraset.2022.41550.
Full textPark, Junyoung, and Eui-Nam Huh. "eCLASS: Edge-Cloud-Log Assuring-Secrecy Scheme for Digital Forensics." Symmetry 11, no. 10 (September 22, 2019): 1192. http://dx.doi.org/10.3390/sym11101192.
Full textNagaraju, Dr Sabout, S. K. V. Jayakumar, and C. Swetha Priya. "Efficient Multi-linear Key Pairing Cryptosystem for Reliable Cloud-based Service Provisioning." Revista Gestão Inovação e Tecnologias 11, no. 4 (August 13, 2021): 4440–55. http://dx.doi.org/10.47059/revistageintec.v11i4.2471.
Full textKhan, Yunus, and Sunita Verma. "An Intelligent Blockchain and Software-Defined Networking-Based Evidence Collection Architecture for Cloud Environment." Scientific Programming 2021 (September 29, 2021): 1–19. http://dx.doi.org/10.1155/2021/7294206.
Full textAgarkhed, Jayashree, and R. Ashalatha. "Data Privacy and Security in Cloud Environment Using Cryptography Approach." Asian Journal of Computer Science and Technology 7, no. 1 (May 5, 2018): 50–54. http://dx.doi.org/10.51983/ajcst-2018.7.1.1830.
Full textQin, Bo, Huaqun Wang, Qianhong Wu, Jianwei Liu, and Josep Domingo-Ferrer. "Simultaneous authentication and secrecy in identity-based data upload to cloud." Cluster Computing 16, no. 4 (April 23, 2013): 845–59. http://dx.doi.org/10.1007/s10586-013-0258-7.
Full textSrilakshmi, K., and P. Bhargavi. "Cloud Computing Security Using Cryptographic Algorithms." Asian Journal of Computer Science and Technology 8, S3 (June 5, 2019): 76–80. http://dx.doi.org/10.51983/ajcst-2019.8.s3.2082.
Full textJanjua, Kanwal, Munam Ali Shah, Ahmad Almogren, Hasan Ali Khattak, Carsten Maple, and Ikram Ud Din. "Proactive Forensics in IoT: Privacy-Aware Log-Preservation Architecture in Fog-Enabled-Cloud Using Holochain and Containerization Technologies." Electronics 9, no. 7 (July 19, 2020): 1172. http://dx.doi.org/10.3390/electronics9071172.
Full textSahar Altaf, Muhammad Wajahat Ali, Muhammad Waqar Khan, Sumaira Yousuf Khan,. "A REVIEW OF THE SECURITY ISSUES IN CLOUD COMPUTING AND ITS REMEDIAL ACTION." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (March 2, 2021): 444–55. http://dx.doi.org/10.17762/itii.v9i1.150.
Full textIzang, A. A., Y. A. Mensah, O. J. Omotosho, and C. P. Obioma. "Overview of Cloud Computing and Recent Addendum." Journal of Communications Technology, Electronics and Computer Science 5 (May 10, 2016): 26. http://dx.doi.org/10.22385/jctecs.v5i0.93.
Full textKanashevskiy, V. A. "Legal problems of using cloud services of foreign providers by Russian banks." Lex Russica, no. 3 (April 5, 2019): 108–15. http://dx.doi.org/10.17803/1729-5920.2019.148.3.108-115.
Full textChiou, Shin-Yan. "A Secure Distributed Cloud Storage System Achieving Data Secrecy and Load Balance." International Journal of Security and Its Applications 11, no. 10 (October 31, 2017): 1–14. http://dx.doi.org/10.14257/ijsia.2017.11.10.01.
Full textKim, Byung Wook. "Secrecy Dimming Capacity in Multi-LED PAM-Based Visible Light Communications." Wireless Communications and Mobile Computing 2017 (2017): 1–6. http://dx.doi.org/10.1155/2017/4094096.
Full textNOMURA, Kenta, Masami MOHRI, Yoshiaki SHIRAISHI, and Masakatu MORII. "Attribute Revocable Multi-Authority Attribute-Based Encryption with Forward Secrecy for Cloud Storage." IEICE Transactions on Information and Systems E100.D, no. 10 (2017): 2420–31. http://dx.doi.org/10.1587/transinf.2016ofp0004.
Full textA., Mohan, and vamshikrishna P. "Accounting and Privacy Preserving of Data Owner in Cloud Storage." International Journal of Innovative Technology and Exploring Engineering 10, no. 6 (April 30, 2021): 14–17. http://dx.doi.org/10.35940/ijitee.f8715.0410621.
Full textChennam, Krishna Keerthi, and M. Akka Lakshmi. "Cloud Security in Crypt Database Server Using Fine Grained Access Control." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 3 (June 1, 2016): 915. http://dx.doi.org/10.11591/ijece.v6i3.8925.
Full textChennam, Krishna Keerthi, and M. Akka Lakshmi. "Cloud Security in Crypt Database Server Using Fine Grained Access Control." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 3 (June 1, 2016): 915. http://dx.doi.org/10.11591/ijece.v6i3.pp915-924.
Full textMuhammad Arslan Tariq, Muhammad Arslan Tariq. "Anomaly based Intrusion Detection System." International Journal for Electronic Crime Investigation 3, no. 3 (September 6, 2019): 7. http://dx.doi.org/10.54692/ijeci.2020.030341.
Full textMuhammad Arslan Tariq, Muhammad Arslan Tariq. "Anomaly based Intrusion Detection System." International Journal for Electronic Crime Investigation 3, no. 3 (September 6, 2019): 7. http://dx.doi.org/10.54692/ijeci.2020.030336.
Full textMuhammad Arslan Tariq, Muhammad Arslan Tariq. "Anomaly based Intrusion Detection System." International Journal for Electronic Crime Investigation 3, no. 3 (September 6, 2019): 7. http://dx.doi.org/10.54692/ijeci.2019.030341.
Full textMuhammad Arslan Tariq, Muhammad Arslan Tariq. "Anomaly based Intrusion Detection System." International Journal for Electronic Crime Investigation 3, no. 3 (September 6, 2019): 7. http://dx.doi.org/10.54692/ijeci.2019.030336.
Full textShi, Yanfeng, and Shuo Qiu. "Ciphertext-Policy Attribute-Based Encryption with Outsourced Set Intersection in Multimedia Cloud Computing." Electronics 10, no. 21 (November 3, 2021): 2685. http://dx.doi.org/10.3390/electronics10212685.
Full textN. Sarode, Snehal, and Geetha R. Chillarge. "Efficient and Secure Multi-Keyword Ranked Search and Group Data Sharing for Encrypted Cloud Data." Journal of Scientific Research 66, no. 02 (2022): 68–78. http://dx.doi.org/10.37398/jsr.2022.660210.
Full textKwofie, A., and A. A. Barik. "Cloud Security: Using Advance Encryption Standard Algorithm to Secure Cloud Data at Client Side and Taking Measures to Protect its Secrecy." International Journal of Advance Research and Innovation 8, no. 3 (2020): 11–14. http://dx.doi.org/10.51976/ijari.832003.
Full textKwao Dawson, John, Frimpong Twum, James Benjamin Hayfron Acquah, and Yaw Marfo Missah. "PRISMA Archetype-Based Systematic Literature Review of Security Algorithms in the Cloud." Security and Communication Networks 2023 (July 3, 2023): 1–17. http://dx.doi.org/10.1155/2023/9210803.
Full textKumariK, Anitha, Sudha Sadasivam G, and Madhumitha R. "Solution to Security and Secrecy in Cloud Environment using PAKE Protocol - A Bibliographic Survey." International Journal of Computer Applications 96, no. 2 (June 18, 2014): 26–36. http://dx.doi.org/10.5120/16767-6334.
Full textWang, Chenyu, Ke Ding, Bin Li, Yiming Zhao, Guoai Xu, Yanhui Guo, and Ping Wang. "An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment." Wireless Communications and Mobile Computing 2018 (October 1, 2018): 1–13. http://dx.doi.org/10.1155/2018/3048697.
Full textAl-Sayyed, Rizik M. H., Wadi’ A. Hijawi, Anwar M. Bashiti, Ibrahim AlJarah, Nadim Obeid, and Omar Y. A. Al-Adwan. "An Investigation of Microsoft Azure and Amazon Web Services from Users’ Perspectives." International Journal of Emerging Technologies in Learning (iJET) 14, no. 10 (May 30, 2019): 217. http://dx.doi.org/10.3991/ijet.v14i10.9902.
Full textWang, Feifei, Guosheng Xu, Guoai Xu, Yuejie Wang, and Junhao Peng. "A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure." Wireless Communications and Mobile Computing 2020 (February 18, 2020): 1–15. http://dx.doi.org/10.1155/2020/3805058.
Full textD, Ramesh, and Rama B. "Secure Privacy Implications for Clients and End-users through Key Assortment Crypto Techniques Implicated Algorithm." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (December 1, 2018): 5443. http://dx.doi.org/10.11591/ijece.v8i6.pp5443-5448.
Full textAbouljam, Sana Mohammed, and Tulika . "Cloud based secured privacy preserving protocol for vehicular DTNS." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 199. http://dx.doi.org/10.14419/ijet.v7i1.1.9455.
Full textRavichandran, S., and J. Sathiamoorthy. "An Innovative Performance of Refuge using Stowage Main Servers in Cloud Computing Equipment." Asian Journal of Computer Science and Technology 10, no. 1 (May 5, 2021): 13–17. http://dx.doi.org/10.51983/ajcst-2021.10.1.2695.
Full textLai, Jian-Foo, and Swee-Huay Heng. "Secure File Storage On Cloud Using Hybrid Cryptography." Journal of Informatics and Web Engineering 1, no. 2 (September 15, 2022): 1–18. http://dx.doi.org/10.33093/jiwe.2022.1.2.1.
Full textAlsaedi, Emad, and Alaa Kadhim. "A comparative study of combining deep learning and homomorphic encryption techniques." Al-Qadisiyah Journal Of Pure Science 27, no. 1 (March 13, 2022): 17–33. http://dx.doi.org/10.29350/qjps.2022.27.1.1452.
Full textZakria Mahrousa, Mahmoud Rahhal, Nairouz Alzin, Zakria Mahrousa, Mahmoud Rahhal, Nairouz Alzin. "Hybrid Secure Model for Securing Data in The Cloud Computing System by Combining RSA, AES and CP-ABE: نموذج هجين آمن لحماية البيانات في الحوسبة السحابية بدمج RSA وAES وCP-ABE." Journal of engineering sciences and information technology 5, no. 4 (December 30, 2021): 80–59. http://dx.doi.org/10.26389/ajsrp.z110521.
Full textCutugno, Matteo, Umberto Robustelli, and Giovanni Pugliano. "Structure-from-Motion 3D Reconstruction of the Historical Overpass Ponte della Cerra: A Comparison between MicMac® Open Source Software and Metashape®." Drones 6, no. 9 (September 6, 2022): 242. http://dx.doi.org/10.3390/drones6090242.
Full textYoun, Taek-Young, and Hyun Sook Rhee. "Secure Symmetric Keyword Search with Keyword Privacy for Cloud Storage Services." Security and Communication Networks 2021 (November 30, 2021): 1–8. http://dx.doi.org/10.1155/2021/2291470.
Full textSomaru, Navilla, and Christa Rautenbach. "Non-criminal dispute resolution in South Africa’s criminal justice system: Proposals for reform." South African Journal of Criminal Justice 33, no. 3 (2020): 646–69. http://dx.doi.org/10.47348/sacj/v33/i3a7.
Full textSastry, J. K. R., and M. Trinath Basu. "Securing multi-tenancy systems through multi DB instances and multiple databases on different physical servers." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 2 (April 1, 2019): 1385. http://dx.doi.org/10.11591/ijece.v9i2.pp1385-1392.
Full textHan, Linrui. "Personal Privacy Data Protection in Location Recommendation System." Journal of Physics: Conference Series 2138, no. 1 (December 1, 2021): 012026. http://dx.doi.org/10.1088/1742-6596/2138/1/012026.
Full textSai Ji, Sai Ji, Yang Yuan Sai Ji, Jian Shen Yang Yuan, Chin-Feng Lai Jian Shen, and Bofan Chen Chin-Feng Lai. "An Efficient Three-Party Authentication and Key Agreement Protocol for Privacy-Preserving of IoT Devices in Mobile Edge Computing." 網際網路技術學刊 23, no. 3 (May 2022): 437–48. http://dx.doi.org/10.53106/160792642022052303002.
Full textMeka, Likhita, and Srivyshnavi Pagadala. "Providing a Secure Cloud Storage by Using Attribute Based Temporary Key Word Search Scheme." Asian Journal of Computer Science and Technology 8, S3 (June 5, 2019): 117–21. http://dx.doi.org/10.51983/ajcst-2019.8.s3.2825.
Full textB, Aravind, Harikrishnan S, Santhosh G, Vijay J.E, and Saran Suaji T. "An Efficient Privacy - Aware Authentication Framework for Mobile Cloud Computing." International Academic Journal of Innovative Research 10, no. 1 (April 20, 2023): 1–7. http://dx.doi.org/10.9756/iajir/v10i1/iajir1001.
Full textMuhammad Umar Munir, Ghulam Abbas Khan, and Arslan Ammin. "Generic Framework Related to Database Forensics and Security Countermeasures." Journal of Computing & Biomedical Informatics 1, no. 01 (September 15, 2020): 15–30. http://dx.doi.org/10.56979/101/2020/42.
Full textMuhammad, Irfan, Hirley Alves, Onel Alcaraz López, and Matti Latva-aho. "Secure Rate Control and Statistical QoS Provisioning for Cloud-Based IoT Networks." Security and Communication Networks 2021 (October 29, 2021): 1–19. http://dx.doi.org/10.1155/2021/8650272.
Full textAlzuwaini, Mustafa, and Ali Yassin. "An Efficient Mechanism to Prevent the Phishing Attacks." Iraqi Journal for Electrical and Electronic Engineering 17, no. 1 (May 19, 2021): 1–11. http://dx.doi.org/10.37917/ijeee.17.1.15.
Full textJamjoom, Mona, Hussein Abulkasim, and Safia Abbas. "Lightweight Authenticated Privacy-Preserving Secure Framework for the Internet of Vehicles." Security and Communication Networks 2022 (September 9, 2022): 1–11. http://dx.doi.org/10.1155/2022/6573060.
Full text