Confimizer: A novel algorithm to optimize cloud resource by confidentiality-cost trade-off using bilstm network

S Achar, N Faruqui, A Bodepudi, M Reddy - IEEE Access, 2023 - ieeexplore.ieee.org
The world is expiring a 23% annual data growth rate and is projected to have a total surplus
volume of 175 Zettabytes by 2025. It imposes significant challenges for small to medium …

[HTML][HTML] Real-time privacy-preserved auditing for shared outsourced data

F Tang, Y Li, Y Zhang, W Susilo, B Li - Computer Standards & Interfaces, 2025 - Elsevier
Health providers need to share patient information across healthcare networks efficiently
and securely to improve medical and health services. Timely data synchronization among …

A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices

S Kumar, D Kumar, R Dangi, G Choudhary… - … Materials and Continua, 2024 - orbit.dtu.dk
The widespread and growing interest in the Internet of Things (IoT) may be attributed to its
usefulness in many different fields. Physical settings are probed for data, which is then …

An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing

P Shrivastava, B Alam, M Alam - Cluster Computing, 2024 - Springer
Nowadays, the need for cloud computing has increased due to the exponential growth in
information transmission. Cybercriminals are persistent in their efforts to breach cloud …

Construction of embedded online teaching platform based on AES-RSA encryption algorithm

X Kong, G Yue - Discover Artificial Intelligence, 2024 - Springer
With the development of economy, people's demand for high-quality and diversified
educational resources increases. However, under the frequent occurrence of network …

[HTML][HTML] Enhancing the Security in Group Message Communication Using Multi-Party Key Distribution Technique

B Haldar, R Sinha, P Paul - Journal of Mobile …, 2024 - journals.riverpublishers.com
Authentication and authorization techniques are essential for any kind of secure transaction
over the Internet. It enables and empowers mechanisms to implement highly secure systems …

DiscoverArtificial Intelligence

X Kong, G Yue - Discover, 2024 - search.proquest.com
With the development of economy, people's demand for high-quality and diversified
educational resources increases. However, under the frequent occurrence of network …