Information Security: A Coordinated Strategy to Guarantee Data Security in Cloud Computing

KI Jones, R Suchithra - International Journal of Data Informatics and …, 2023 - ijdiic.com
This paper discusses different techniques and specialized procedures which can be used to
effectively protect data from the owner to the cloud and then to the user. The next step …

Consideration of Data Security and Privacy Using Machine Learning Techniques

TC Phan, HC Tran - International Journal of Data Informatics and …, 2023 - ijdiic.com
As artificial intelligence becomes more and more prevalent, machine learning algorithms are
being used in a wider range of domains. Big data and processing power, which are typically …

Dynamic Mobile Cloud Eco System Security-A Review

M Anitha, M Senbagavalli - International Journal of Data Informatics and …, 2023 - ijdiic.com
Mobile cloud computing is the technique of using cloud technology and various rich mobile
applications are intended to be able to run on a variety of mobile devices using the …

Cryptographic Interweaving of Messages

PM Krishnaraj - International Journal of Data Informatics and Intelligent …, 2023 - ijdiic.com
During the past several decades, the information and communication technology sector has
advanced significantly, enabling extensive information interchange over the internet …

A Hybrid Double Encryption Approach for Enhanced Cloud Data Security in Post-Quantum Cryptography.

M CV, N AN - … Journal of Advanced Computer Science & …, 2023 - search.ebscohost.com
Quantum computers and research on quantum computers are increasing due to the
efficiency and speed required for critical applications. This scenario also kindles the vitality …

A Hybrid Double Encryption Approach for Enhanced Cloud Data Security in Post-Quantum Cryptography

CV Manjushree, AN Nandakumar - search.proquest.com
Quantum computers and research on quantum computers are increasing due to the
efficiency and speed required for critical applications. This scenario also kindles the vitality …