Location-Based Cryptographic Techniques for Data Protection

NSM Shamsuddin, SA Pitchay - Malaysian Journal of Science …, 2019 - mjosht.usim.edu.my
Data protection has become one of the significant issues in cloud computing when end
users must rely on their cloud providers for security purposes. Cloud providers never …

[PDF][PDF] Geo-encryption to access the data using AES algorithm

H Pant, V Kaushik, V Priyanshi Singhal - Int J Eng Appl Sci Technol, 2016 - ijeast.com
The location based encryption or Geo-Encryption technique that uses GPS technology to
enhance the data security. This concept is developed so that at a particular position and …

Location-based Cryptographic Techniques: Its Protocols and Parameters

NSM Shamsuddin, SA Pitchay - RITA 2018: Proceedings of the 6th …, 2020 - Springer
Storing data via online increased rapidly and this massive data has become significant to be
secured due to the data invasion. Hence, encryption to transmit data securely in open …

[PDF][PDF] Location Based Encryption-Decryption Approach for Data Security

V Borse Manoj, D Bhandure Harshad… - Int J Comput Appl …, 2014 - academia.edu
Data security is an important task in today‟ s life. Data security can be done using GPS
device. Among computer user mostly use data in electronic format. How to provide a security …

[PDF][PDF] Location-based Cryptographic Techniques: Its Protocols and Parameters

SA Pitchay, SI Malaysia - researchgate.net
Storing data via online increased rapidly and this massive data has become significant to be
secured due to the data invasion. Hence, encryption to transmit data securely in open …

[PDF][PDF] Location Based Security

M Verma, M Rahatwal, A Yadav, M Sian, N Parmar - 2019 - academia.edu
ABSTRACT− Data security is a very important task in today's life. Data security can be done
using GPS device. Among soul largely use information in electronic format. How to offer a …