Hybrid cryptographic approach for internet ofhybrid cryptographic approach for internet ofthings applications: A review
NN Mohamed, YM Yussoff, MA Saleh… - Journal of Information …, 2020 - e-journal.uum.edu.my
… To deal with this issue cryptographic techniques is proposed. The … homomorphic encryption
and RSA were implemented in the proposed architecture. The implementation offered a fast …
and RSA were implemented in the proposed architecture. The implementation offered a fast …
A hybrid architecture for interactive verifiable computation
V Vu, S Setty, AJ Blumberg… - 2013 IEEE Symposium on …, 2013 - ieeexplore.ieee.org
… on expensive cryptography, … -cryptographic protocols to a much broader class of computations,
(b) uses static analysis to fail over to the cryptographic ones when the non-cryptographic …
(b) uses static analysis to fail over to the cryptographic ones when the non-cryptographic …
A hybrid architecture for resolving Cryptographic issues in internet of things (IoT), Employing Quantum computing supremacy
… and carry on with issues that can be featured … issues in terms of cryptography this
research will also provide the answer. At long last, this research will call attention to the hybrid …
research will also provide the answer. At long last, this research will call attention to the hybrid …
A hybrid blockchain-edge architecture for electronic health record management with attribute-based cryptographic mechanisms
… hybrid blockchain-edge architecture for managing Electronic Health Records (EHRs) with
attribute-based cryptographic … the ABSA module on Hyperledger Ursa cryptography library, MA-…
attribute-based cryptographic … the ABSA module on Hyperledger Ursa cryptography library, MA-…
Hybrid cryptography algorithms in cloud computing: A review
… Thus, when both types of algorithms apply in architecture protocol, the obtained new protocol
architecture shows greater stability against errors such that providing a high security level. …
architecture shows greater stability against errors such that providing a high security level. …
[PDF][PDF] A hybrid cryptographic model for data storage in mobile cloud computing
OP Akomolafe, MO Abodunrin - International Journal of Computer …, 2017 - mecs-press.net
… as one of the major approaches to solving data security issues is defined as the process of
… 5 shows the architecture for the decryption process of the cryptographic model. The steps …
… 5 shows the architecture for the decryption process of the cryptographic model. The steps …
A hybrid blockchain architecture for privacy-enabled and accountable auctions
… these privacy issues by leveraging advanced cryptographic … This lack of public accountability
could be an issue for certain … Our proposed solution uses standard cryptographic tools (eg…
could be an issue for certain … Our proposed solution uses standard cryptographic tools (eg…
Design of secure storage for health-care cloud using hybrid cryptography
P Chinnasamy, P Deepalakshmi - 2018 second international …, 2018 - ieeexplore.ieee.org
… hybrid architecture based on Cryptographic as a Service (CaaS) to authorize cloud clients
for their cryptographic … They gave a detailed overview of different security issues and how we …
for their cryptographic … They gave a detailed overview of different security issues and how we …
New security protocol using hybrid cryptography algorithm for WSN
KM Abdullah, EH Houssein… - 2018 1st International …, 2018 - ieeexplore.ieee.org
… has been a major issue facing a lot of facilities; thus comes the need for improving the
security systems for the WSN. This paper aims to propose a hybrid security protocol for WSN. …
security systems for the WSN. This paper aims to propose a hybrid security protocol for WSN. …
[PDF][PDF] A hybrid cryptographic system for secured device to device communication
AR Krishna, ASN Chakravarthy… - International Journal of …, 2016 - academia.edu
… In this paper, we introduce a novel hybrid cryptographic approach that could address multiple
… Thus, the proposed hybrid cryptographic approach is robust in nature while easy and …
… Thus, the proposed hybrid cryptographic approach is robust in nature while easy and …
相关搜索
- quantum computing supremacy hybrid architecture
- adaptive cryptographic hybrid encryption
- hybrid cryptography secure file storage
- hybrid blockchain edge architecture
- hybrid cryptography algorithms
- hybrid cryptographic schemes
- hybrid cryptographic technique
- hybrid cryptographic model
- hybrid cryptography approach
- hybrid cryptographic system
- hybrid cryptography health care cloud
- hybrid cryptography efficient data security
- hybrid cryptography cloud security
- hybrid cryptography data privacy
- hybrid cryptography wireless sensor network
- internet of things hybrid architecture