[HTML][HTML] The immersion cooling technology: Current and future development in energy saving

NA Pambudi, A Sarifudin, RA Firdaus, DK Ulfa… - Alexandria Engineering …, 2022 - Elsevier
The world's energy consumption shows an increasing trend. Unfortunately, it is still
dominated by the use of fossil energy. This condition results in concerns that an energy …

[HTML][HTML] A hybrid approach of secret sharing with fragmentation and encryption in cloud environment for securing outsourced medical database: a revolutionary …

DN Le, B Seth, S Dalal - Journal of Cyber Security and …, 2018 - journals.riverpublishers.com
Cloud Computing is observed as the greatest paradigm change in Information technology.
Data outsourcing is an inventive representation with the intention of trustworthy storage and …

Technical Review on Symmetric and Asymmetric Cryptography Algorithms.

S Rani, H Kaur - … Journal of Advanced Research in Computer …, 2017 - search.ebscohost.com
If you want to keep your information safe and secret, you have the possible strategies are:
hide the existence of the information, or make the information unintelligible. Cryptography is …

Leveraging the power of quantum computing for breaking RSA encryption

M Sharma, V Choudhary, RS Bhatia, S Malik… - Cyber-Physical …, 2021 - Taylor & Francis
Encryption is the process of securing confidential data that bars a third party's access to the
information. RSA encryption utilises the property of complexity classes wherein the problem …

[PDF][PDF] Cryptography: Avalanche effect of AES and RSA

R Verma, AK Sharma - International Journal of Scientific and …, 2020 - academia.edu
Security is a major concern in the field of computer science. With the advancement in
technology security of data from theft has become a major obstacle. It is necessary to encrypt …

A decentralized solution for web hosting

TT Huynh, TD Nguyen, H Tan - 2019 6th NAFOSTED …, 2019 - ieeexplore.ieee.org
This paper proposes a decentralized solution for web hosting based on interplanetary file
system (IPFS) and Ethereum blockchain. Particularly, we use Ethereum smart contracts to …

A Review on Symmetric Key Cryptography Algorithms.

A Kaur - International Journal of Advanced Research in …, 2017 - search.ebscohost.com
Security is the most important aspect in the field of internet and network application. It is an
important task to secure information over the network. To secure information, cryptography …

Estimation of various parameters for AES, DES, and RSA

J Agarwal, M Kumar, AK Srivastava - Emerging Technologies in Data …, 2021 - Springer
Securing the data from unauthorized access is turn out to be a major challenge nowadays.
Large volume of data is available in every field for which the security is most crucial. To …

Implementation and analysis of various encryption techniques with Blowfish on various data files

M Goyal, A Sharma - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
In today's information technology era, data security is a big concern. Because data is stored
in various locations throughout the world, it becomes especially dangerous in the cloud …

An overview of the status, challenges, and trends of the advanced crypto algorithms to enhance the security of wireless networks

RA Al-Kaabi, HF Fakhruldeen… - AIP Conference …, 2023 - pubs.aip.org
In modern applications, such as real-time applications, high-speed end-to-end transmission
sometimes conflicts with the requirements of confidentiality and security. One of the most …