An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment

KV Pradeep, V Vijayakumar… - Journal of Computer …, 2019 - Wiley Online Library
Cloud computing is a platform to share the data and resources used among various
organizations, but the survey shows that there is always a security threat. Security is an …

Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud

M Thangavel, P Varalakshmi - Cluster Computing, 2018 - Springer
Cloud computing enables the access of the resources such as network hardware's, storage,
applications and services that are configurable based on the demand in a network …

An identity-based elliptic curve cryptography for mobile payment security

OR Vincent, TM Okediran, AA Abayomi-Alli… - SN Computer …, 2020 - Springer
Security breaches have been observed in different dimensions in mobile payment system.
The violation of user's privacy is a common phenomenon in mobile payment transactions …

Hybrid cryptography for secure data communication in wireless sensor networks

S Prakash, A Rajput - Ambient Communications and Computer Systems …, 2018 - Springer
Nodes in the wireless sensor networks (WSN) have limited battery power and deployed to
run few days. In general, sensor nodes are placed at very complicated locations; therefore …

[HTML][HTML] An improved image encryption algorithm based on Bézier coefficients matrix

NHM Ismail, MY Misro - Journal of King Saud University-Computer and …, 2022 - Elsevier
In recent years, numerous images are engaged over various unprotected broad networks,
causing safety and privacy threats to users. This is where image encryption plays a role in …

A novel image encryption method for e-governance application using elliptic curve pseudo random number and chaotic random number sequence

S Adhikari, S Karforma - Multimedia Tools and Applications, 2022 - Springer
Image encryption is gaining popularity due to the rapid use of internet technology. Security
attacks on the image can occur when images are shared through the internet. E-governance …

[PDF][PDF] A new modification for menezes-vanstone elliptic curve cryptosystem

ZE Dawahdeh, SN Yaakob… - Journal of Theoretical …, 2016 - researchgate.net
Information security algorithms are widely used in the recent times to protect data and
messages over internet. Elliptic Curve Cryptography (ECC) is one of the most efficient …

[PDF][PDF] Secure file sharing mechanism and key management for mobile cloud computing environment

I Indu, PMR Anand, SP Shaji - Indian Journal …, 2016 - sciresol.s3.us-east-2.amazonaws …
Objectives: The use of the mobile devices in cloud computing environment is susceptible to
various kinds of attacks like, unauthorized access, account/service hijacking, data breach …

A review on structured scheme representation on data security application

SN Mohd Salleh, R Din, NH Zakaria… - Indonesian Journal of …, 2018 - repo.uum.edu.my
With the rapid development in the era of Internet and networking technology, there is always
a requirement to improve the security systems, which secure the transmitted data over an …

EGECC-MAES: Lightweight hybrid encryption algorithm in blockchain for smart health care in the Internet of Things platform

A Charmi… - 2024 20th CSI International …, 2024 - ieeexplore.ieee.org
In recent years, health care Internet of things has become one of the most important and vital
technologies for human health care needs. But the security challenge in this technology has …