Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud

M Thangavel, P Varalakshmi - Cluster Computing, 2018 - Springer
Cloud computing enables the access of the resources such as network hardware's, storage,
applications and services that are configurable based on the demand in a network …

Image encryption and decryption in public key cryptography based on MR

DIG Amalarethinam, JS Geetha - … International Conference on …, 2015 - ieeexplore.ieee.org
In the past decade, image encryption is given much attention in research of information
security and a lot of image encryption algorithms have been introduced. Due to some …

Mathematical model of the process of tabular's implementation of the operation algebraic multiplication in the residues class

V Krasnobaev, M Zub, T Kuznetsova… - … on Information and …, 2019 - ieeexplore.ieee.org
The article synthesizes a mathematical model of the process of tabular implementation of
modular multiplication, for both positive and negative numerical ranges of means of …

Data Control Method, which Presented By Code of Non-Positioning System of Deduction Class Calculation

V Krasnobaev, O Reshetniak… - … on Information and …, 2019 - ieeexplore.ieee.org
The paper proposes a new method of monitoring data presented in non-positional residue
class system. For code in residue class system, test bases are included in the general code …

Enhancing security level for public key cryptosystem using MRGA

DIG Amlarethinam, JS Geetha - 2014 World Congress on …, 2014 - ieeexplore.ieee.org
The efficiency of cryptographic algorithm is not only based on the time taken for encryption
and decryption, but also the number of levels used to get the cipher text from a plain text …

Time-constrained strong multi-designated verifier signature suitable for Internet of things–based collaborative fog computing systems

HY Lin - International Journal of Distributed Sensor …, 2021 - journals.sagepub.com
Fog computing is viewed as an extended technique of cloud computing. In Internet of things–
based collaborative fog computing systems, a fog node aggregating lots of data from Internet …

[PDF][PDF] Add-on security level for public key cryptosystem using magic rectangle with column/row shifting

DI George, JS Geetha, K Mani - International Journal of Computer …, 2014 - Citeseer
In today's world, security is required to transmit confidential information over the network.
Security is also demanded in wide range of applications. Cryptographic algorithms play an …

[PDF][PDF] A review of secure data sharing in cloud using key aggregate cryptosystem and decoy technology

RV Mahalle, PP Pawade - Int J Sci Res, 2014 - Citeseer
Data sharing is an important functionality in cloud storage. I show how to securely, efficiently,
and flexibly share data with Decoy technology in secure cloud storage. I describe new public …

[PDF][PDF] A Research on enhancing public key cryptography by the use of MRGA with RSA and N-Prime RSA

H Gandhi, V Gupta, I Rajput - … for Innovative Research in Science & …, 2015 - academia.edu
In current scenario everything is being transferred on the web and other communication
medium. So that we need to make our data secure from all other attacker and unauthorized …

[PDF][PDF] Security Scheme for Data Authentication Based on Elliptic Curve Cryptography

K Thamodaran, K Kuppusamy - 2016 - ijcset.com
An encryption is providing authentication and security for illicit manipulation of digital data. In
this paper the security scheme for authentication and secrecy of digital data through …