[PDF][PDF] A hybrid cryptographic model for data storage in mobile cloud computing

OP Akomolafe, MO Abodunrin - IJ Computer Network and …, 2017 - academia.edu
Mobile Cloud Computing (MCC) is a paradigm that integrates Cloud Computing and Mobile
Computing to deliver a better Quality of Experience (QoE) and Quality of Service (QoS) to …

[PDF][PDF] A hybrid hashing security algorithm for data storage on cloud computing

NM AbdElnapi, FA Omara, NF Omran - International Journal of …, 2016 - academia.edu
In today's modern IT everything is possible on the web by cloud computing, it allows us to
create, configure, use and customize the applications, services, and storage online. The …

Hybrid cryptographic technique using OTP: RSA

Karthik, Chinnasamy… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Communication plays a vital role in our day to day life for sharing the data. The data must be
confidential and protected. Protecting the information is very important during …

Secure Image encryption algorithm based on DNA Encoding and Chaos map for cloud computing

MA Wafik - Journal of Computing and Communication, 2022 - journals.ekb.eg
Cloud computing is rapidly expanding in the IT business today, providing a new approach to
handling various information systems. The fast advancement of technology necessitates the …

Implementation of efficient mix column transformation for aes encryption

M Junias, A Lavanya - 2018 4th International Conference on …, 2018 - ieeexplore.ieee.org
The National Institute of Standards and Technology (NIST) announced Rijndael as the new
Advanced Encryption Standard (AES). DES algorithm was the predecessor of AES algorithm …

Enhanced advanced encryption standard with randomised s box

DS Jat, IS Gill - 2020 5th International Conference on …, 2020 - ieeexplore.ieee.org
Networks and communications today is an inherent part of any military and defence force
organisation. Internet of things (IoT) is also making inroads into various defence networks …

[PDF][PDF] Securing Sensitive Digital Data in Educational Institutions using Encryption Technology

WK ElSaid - International Journal of Computer Science and …, 2018 - academia.edu
Recently, modern technologies have made a positive contribution to most institutions of the
society. However, they have generated serious issues with regard to the data security. For …

[PDF][PDF] Secure routing in MANET using hybrid cryptography

D Sivamurugan, L Raja - Int. J. Res. Granthaalayah, 2017 - pdfs.semanticscholar.org
Mobile ad hoc network (MANET) is a group of mobile nodes that communicates with each
other without any supporting infrastructure. These networks have some unique features such …

Advanced encryption standard with Randomized round keys for communication security in IoT networks

IS Gill, DS Jat - The IoT and the Next Revolutions Automating the …, 2019 - igi-global.com
Internet of things (IoT) is a rapidly emerging architecture connecting smart devices all across
the world in various fields like smart homes, smart cities, health sector, security, etc. Security …

Symmetric and Asymmetric Cryptographic Approach based Security Protocol for Key Exchange

R Nadaf, NB Sumangala, M Mandi… - … Conference on Applied …, 2023 - ieeexplore.ieee.org
Recently, the security of confidential data over any communication channel has gained
paramount importance. To tackle the problem of security breach, encryption and decryption …