[图书][B] Cloud Security: Concepts, Applications and Practices

JS Murthy, GM Siddesh, KG Srinivasa - 2024 - books.google.com
This comprehensive work surveys the challenges, the best practices in the industry, and the
latest developments and technologies. It covers the fundamentals of cloud computing …

Knapsack Encryption with Elliptic Curve Cryptography Based Secured Wireless Network

V Arun, PG Kuppusamy, G Naveen… - 2023 2nd International …, 2023 - ieeexplore.ieee.org
This research study discusses about the prospective future research areas while presenting
the state-of-the-art in wireless network cryptography. Elliptic Curve Cryptography (ECC) …

CloudGuardian: Safeguarding the Internet of Things (IoT)–Navigating Security Frontiers in Cloud-Connected Ecosystems

JB Dinesh, JS Murthy - Cloud Security, 2024 - taylorfrancis.com
In recent times, the proliferation of Internet of Things (IoT) devices and the seamless
integration with cloud computing have revolutionized the technological landscape. This …

Research on channel quantitation and key negotiation technology in key generation based on satellite-ground communication

Y Li, H Hou, J Lu, W Wang - … of the 2nd International Conference on …, 2023 - dl.acm.org
The security of physical layer in satellite-ground communication is the research hotspots and
it has attracted wide attention. Physical layer key generation technology mainly generates …

Cryptography Techniques and Internet of Things Applications–A Modern Survey

S Sarveswaran, G Shangkavi… - Int. J. of Aquatic …, 2021 - journal-aquaticscience.com
Cryptography's single most essential application in the internet of things is securing
communication routes. Here are a few examples of how current encryption can help make …

Advance Security Schemes for Smart Societies

M Joshi, B Mazumdar, S Dey - Green Technological Innovation for …, 2021 - Springer
Internet technology has become a boon to humans as it transformed our way of thinking and
changed our way of living. What looked like a scene from a sci-fi movie has become a reality …

DNA based service data security in cloud computing environment

A Patel, Z Ge, I Seher - 2021 6th International Conference on …, 2021 - ieeexplore.ieee.org
Cloud computing is the type of technology preferred to maintain computing power, computer
resources, and majorly used to handle the cloud storage process. Also, it helps to manage …

A Network Intrusion Detection Model for IoT Networks

SE Obamiyi, AD Adebusuyi… - … and Business for …, 2024 - ieeexplore.ieee.org
The integration of processing power into everyday objects has given rise to internet of things
(IoT). While this is good for the actualization of ubiquitous computing, it also increases the …

Two party generation of SM9 digital signature

W Ye, Y Long - 2020 IEEE 20th International Conference on …, 2020 - ieeexplore.ieee.org
SM9 is an identity-based cryptography algorithm published by the State Cryptography
Administration of China, which has great application value because of its high security and …

Study on Hybrid Encryption Technology of Power Gateway Based on AES and RSA Algorithm

B Zhang, G Ma, X Lu, W Xu - 2022 14th International …, 2022 - ieeexplore.ieee.org
In order to solve the problem of security risks of gateways in complex communication
networks of power Internet of Things, this paper proposes a hybrid encryption system that …