An empirical client cloud environment to secure data communication with alert protocol

D Soni, D Srivastava, A Bhatt… - Mathematical …, 2022 - Wiley Online Library
Cloud computing is a technology that provides resources and utility services based on user
demand. Due to this demand, efficient cloud security protocols are highly required …

Survey of applications, advantages, and comparisons of AES encryption algorithm with other standards

BL Ananya, V Nikhitha, S Arjun… - International Journal of …, 2023 - milestoneresearch.in
Nowadays data sharing over the internet is a major and critical issue due to security
problems. So more security mechanisms are required to protect the data while sharing …

A secure framework to prevent three-tier cloud architecture from malicious malware injection attacks

BVS Rao, V Sharma, N Rathore, D Prasad… - International Journal of …, 2023 - igi-global.com
The concept of cloud computing makes it possible to have a shared pool of reconfigurable
computing resources that can be deployed and released with little involvement from …

Integrating RC6 Stream Cipher to A Chaotic Synchronization System

FH Hsiao, SW Chang - IEEE Access, 2024 - ieeexplore.ieee.org
With the advancement of technology, convenient communication fills every part of people's
lives. However, the data may be stolen during the transmission process. Therefore, this …

System for secure information exchange of text data through the radio channel of the ism band

A Lavdanskyi, E Faure… - Bulletin of Cherkasy …, 2022 - bulletin-chstu.com.ua
A system of secure information exchange of text data through the radio channel of the ISM
band is developed. The system uses non-separable factorial coding and allows the …

Performance Exploration of Network Intrusion Detection System with Neural Network Classifier on The KDD Dataset.

S Devaraju, D Soni, S Jawahar… - … Journal of Safety & …, 2024 - search.ebscohost.com
Abstract Network Intrusion Detection Systems (NIDS) are a difficult task for determining in
any managerial information system or IT sectors, if a user is a normal user or an attacker …

Система захищеного інформаційного обміну текстовими даними через радіоканал ISM-діапазону

АО Лавданський, ЕВ Фауре… - Вісник Черкаського …, 2022 - er.chdtu.edu.ua
У роботі розроблено систему захищеного інформаційного обміну текстовими даними
через радіоканал ISM-діапазону. Система використовує нероздільне факторіальне …

[PDF][PDF] Research Article An Empirical Client Cloud Environment to Secure Data Communication with Alert Protocol

D Soni, D Srivastava, A Bhatt, A Aggarwal, S Kumar… - 2022 - academia.edu
Cloud computing is a technology that provides resources and utility services based on user
demand. Due to this demand, efficient cloud security protocols are highly required …

IoT based Data Protection Technique for Security and Privacy Preserving in Cloud ERP

E Sabbarwal, DS Pandey - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
The use of cloud computing is a fundamental technology that enables the sharing of
resources over the internet. The preservation of data confidentiality during storage is a …