[PDF][PDF] Fingerprint Agreement Using Enhanced Kerberos Authentication Protocol on M-Health.

AS Anakath, S Ambika, S Rajakumar… - … Systems Science & …, 2022 - cdn.techscience.cn
Cloud computing becomes an important application development platform for processing
user data with high security. Service providers are accustomed to providing storage centers …

Integrity auditing for secure cloud storage on sensitive data protection

J Sivakumar, M Malik… - 2022 IEEE 2nd …, 2022 - ieeexplore.ieee.org
Users can interchange data with others and remotely store their data on the cloud using
cloud storage services. The integrity of data saved in the cloud should be ensured through …

A novel and provably secure mutual authentication protocol for cloud environment using elliptic curve cryptography and fuzzy verifier

KA Patel, S Shukla, SJ Patel - Concurrency and Computation …, 2024 - Wiley Online Library
Cloud computing is an emerging paradigm that enables on‐demand data storage without
considering the local infrastructure limitations of end‐users. The extensive growth in number …

[HTML][HTML] Anomaly detection of smart grid equipment using machine learning applications

AS Rajasekaran… - Distributed …, 2022 - journals.riverpublishers.com
Many application systems in today's smart grid network comprise a variety of middleware
components, such as vibrating or spinning electrical equipment, data bases, storage …

Efficient and Revocable Anonymous Account Guarantee System Based on Blockchain

W Liang, Y Wang, Y Ding, H Liang, C Yang… - International Conference …, 2023 - Springer
The fast expansion of information technology and public concern for personal privacy and
security have raised expectations for the authentication process. Although existing …

Authorization Scheme for Secure Data Retrieval Using Lls-haval With Gkld-ecc in the Cloud

CS Tiwari, VK Jha - 2023 - researchsquare.com
The cloud platform is the best choice to provide more space for storing and transmitting data
from one location to another in a fast manner for internet users. Nevertheless, while using …

双共识混合链跨异构域身份认证方案

张利华, 刘季, 曹宇, 陈世宏, 郑琛, 张赣哲 - 应用科学学报, 2022 - jas.shu.edu.cn
针对目前基于区块链的身份认证方案存在节点性能损耗严重的问题, 提出一种基于双共识混合链
的跨异构域身份认证方案. 采用多因子分析方法对基于综合性能的Raft 共识算法进行优化 …

[PDF][PDF] ELTPA: EFFECTIVE LIGHTWEIGHT THIRD-PARTY AUTHENTICATION PROTOCOL FOR CLOUD INTEGRITY AND SECURITY

KR Krishna, CVG Rao - 2022 - academia.edu
With the increasing demand for adaptation, cost minimization, high availability, scalability of
cloud computing is also increasing. Cloud security is emerged as a critical component of its …

[PDF][PDF] Research Article Current-Fed Bidirectional DC-DC Converter Topology for Wireless Charging System Electrical Vehicle Applications

PS Subudhi, M Thilagaraj, CSS Ganesh, S Diwakaran… - network, 2021 - academia.edu
This paper compares the efficiency of a modified wireless power transfer (WPT) system with
a current-fed dual-active half-bridge converter topology and a complete bridge converter …