[PDF][PDF] Performance analysis of encryption and decryption algorithm

S Pronika, S Tyagi - Indonesian Journal of Electrical …, 2021 - pdfs.semanticscholar.org
In this tumultuous 21st century, we are surrounding by lots of applications such as social
media websites all over the internet or this era can also define as digital era in which …

Secure data storage in cloud using encryption algorithm

SS Tyagi - 2021 third international conference on intelligent …, 2021 - ieeexplore.ieee.org
The Cloud Computing is a self-motivated term, which gives argument free information
outsourcing service, which keep the client from burdens of nearby storage issues. Presently …

[PDF][PDF] A Comprehensive Study on the Dimensions of IaaS Security

M Héder, E Rigó - Journal of Internet Services and Information …, 2024 - eprints.sztaki.hu
In this paper we conduct a systematic exploration of the security considerations of
Infrastructureas-a-Service (IaaS) cloud deployments. These deployments are very common …

Security Challenges and Issues in Cloud Computing

R Zakiyyah, D Permana, D Valenecio… - 2024 International …, 2024 - ieeexplore.ieee.org
Managing data has changed significantly because of cloud computing, which offers scalabe,
flexible and reasonably priced solutions to enterprises and to people as well such as …

Construction a virtual central network for all Iraq's fire station

WH Ghasab, AA Hadi, AGK Alshami… - … Journal of Internet …, 2024 - mesopotamian.press
Fire stations are crucial in Iraq for protecting human life, property, and vital economic and
religious infrastructure. In this paper, a design for a centralized virtual network that brings …

Review on Cloud Security and Challenges on Higher Education

MII Khalid, MF Zolkipli - Malaysian Journal of Applied …, 2022 - journal.unisza.edu.my
Many new developments are often plagued with security concerns. Although emerging
innovations have all the potential to change systems and people's lives, security issues …

Optimized Modelling and Evaluation of Wireless Sensor Networks for Intrusion Detection in Military Applications

SM Fayadh - Journal of Al-Qadisiyah for Computer Science and …, 2024 - jqcsm.qu.edu.iq
Wireless sensor networking is a promising technology with a wide range of applications,
including health care and defense. The security of Wireless Sensor Networks (WSNs) is a …

[PDF][PDF] Analysis on Cloud Implementations of Security

DMS Naili Dwivedi, A Varkale - … and Medical Sciences (ISSN: 2582-6212), 2022 - rjetm.in
Cloud Computing can be classified as a new paradigm for dynamic provisioning computer
services supported by data centres that usually employ virtual machine (VM) technology for …

CONTINUANCE INTENTION USAGE OF CLOUD ERP AMONG MSMES IN COIMBATORE

AS Lakshmi, S Kavitha - 2022 - dspaceir.psgrkcw.com
Literature reviews are the evidence of previous research which helps to identify the gap in
the existing studies that open a path for new research. This is the base for all research …