With the increasing rise of distributed system technologies, one of the most pressing problems facing the digital world is ensuring the security of sensitive and confidential data …
Recent growth in the Internet of Things (IoT) has raised security concerns over the confidentiality of data exchanged between IoT devices and the edge. Many IoT systems …
Many applications use asymmetric cryptography to secure communications between two parties. One of the main issues with asymmetric cryptography is the need for vast amounts of …
R Atiqur, G Wu, AM Liton - Indonesian Journal of …, 2020 - pdfs.semanticscholar.org
Nowadays, the masonry for environment-friendly and protected network infrastructure designs, for example, Internet of Things (IoT) and gigantic information analytics are …
F Li, T Guo, X Li, J Wang, Y Xia, Y Ma - Electronics, 2023 - mdpi.com
Cloud desktop represents an outstanding product in the domain of cloud computing, which refers to the desktop cloud, desktop virtualization and virtual desktop. Cloud desktop …
Cloud computing has seen the fastest adoption due to its tremendous benefits to business organizations and individuals. However, ensuring the security level is essential as users …
Cloud computing is an internet-based technology that is becoming an emerging trend. It provides on-demand cloud-based services. Although it has many advantages, cloud …
In recent years and with the great progress of the use of cloud computing and their uses that covered most aspects of modern life as well as provide a variety of services, such as the …
NP Hegde, P Deepthi - International Conference on Communications and …, 2023 - Springer
The data everywhere was being transferred for each second using domain of Internet of Things (IoT). To secure data using the Internet of Things (IoT) is a tedious task. When the …