[PDF][PDF] Cloud data security and various cryptographic algorithms

Y Alemami, AM Al-Ghonmein… - … Journal of Electrical …, 2023 - researchgate.net
Cloud computing has spread widely among different organizations due to its advantages,
such as cost reduction, resource pooling, broad network access, and ease of administration …

[HTML][HTML] Security enhancement and attack detection using optimized hybrid deep learning and improved encryption algorithm over Internet of Things

V Akshaya, V Mandala, C Anilkumar, P VishnuRaja… - Measurement …, 2023 - Elsevier
Exponential increases in smart devices and reduced costs of sensors have increased
applications using IoT (Internet of Things). There has been an extensive analysis on the …

GSAPSO-MQC: medical image encryption based on genetic simulated annealing particle swarm optimization and modified quantum chaos system

S Yin, H Li - Evolutionary Intelligence, 2021 - Springer
Due to the large amount of image information data, high redundancy and high pixel
correlation, the traditional medical image encryption algorithm is easy to be attacked by …

[HTML][HTML] A complex encryption system design implemented by AES

Z Lu, H Mohamed - Journal of Information Security, 2021 - scirp.org
With the rapid development of internet technology and the increasing popularity of e-
commerce, data encryption technology plays a very important role in data security …

Research on security anomaly detection for big data platforms based on quantum optimization clustering

L Deng, L Wan, J Guo - Mathematical Problems in Engineering, 2022 - Wiley Online Library
Due to the explosive growth of data in the Internet, more and more applications are being
deployed on Big Data platforms. However, as the scale of data continues to increase, the …

[Retracted] Application of Information Encryption Technology in Computer Network Communication Security

H Zhang - Wireless Communications and Mobile Computing, 2022 - Wiley Online Library
In order to improve the communication efficiency while ensuring the security of
communication information, this paper proposes a design and research method of a …

[Retracted] Mathematical Modeling Analysis of Data Attribute Encryption for Robot

J Sun, J Yan, D Yang - Journal of Sensors, 2022 - Wiley Online Library
Encrypting data based on the data attributes of robots is one of the effective methods to
control access users in the data outsourcing environment. Therefore, a mathematical …

Efficient Inverse Model for Cloud Computing and Information Based on the Symmetric Random Matrix

N Cheng, Y Cheng - Mathematical Problems in Engineering, 2022 - Wiley Online Library
With the continuous development of cloud storage technology, cloud storage has become a
new way of storage for both enterprises and individuals. The cloud environment can support …

Atrial fibrillation medical image encryption algorithm based on deep learning and adaptive block

J Li, L Feng, X Guo - International Journal of …, 2023 - inderscienceonline.com
In this paper, a deep learning and adaptive block-based chaotic encryption algorithm for
atrial fibrillation medical image is proposed. Firstly, we use 2D Sine Logistic chaos system to …

[PDF][PDF] Research on secure storage of network data based on cloud computing technology

J Zhu - International Journal of Network Security, 2022 - ijns.jalaxy.com.tw
Cloud storage technology brought by cloud computing relieves the storage performance
pressure of independent computers, but it also puts forward requirements for data storage …