Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey

S Ullah, J Zheng, N Din, MT Hussain, F Ullah… - Computer Science …, 2023 - Elsevier
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …

Data security and privacy protection for cloud storage: A survey

P Yang, N Xiong, J Ren - Ieee Access, 2020 - ieeexplore.ieee.org
The new development trends including Internet of Things (IoT), smart city, enterprises digital
transformation and world's digital economy are at the top of the tide. The continuous growth …

Secure attribute-based data sharing for resource-limited users in cloud computing

J Li, Y Zhang, X Chen, Y Xiang - computers & security, 2018 - Elsevier
Data sharing becomes an exceptionally attractive service supplied by cloud computing
platforms because of its convenience and economy. As a potential technique for realizing …

A survey on cloud computing security: Issues, threats, and solutions

S Singh, YS Jeong, JH Park - Journal of Network and Computer …, 2016 - Elsevier
Over the internet, the cloud computing reveals a remarkable potential to provide on-demand
services to consumers with greater flexibility in a cost effective manner. While moving …

Security in Internet of Things: issues, challenges, taxonomy, and architecture

V Adat, BB Gupta - Telecommunication Systems, 2018 - Springer
Internet technology is very pervasive today. The number of devices connected to the
Internet, those with a digital identity, is increasing day by day. With the developments in the …

Defending against phishing attacks: taxonomy of methods, current issues and future directions

BB Gupta, NAG Arachchilage, KE Psannis - Telecommunication Systems, 2018 - Springer
Internet technology is so pervasive today, for example, from online social networking to
online banking, it has made people's lives more comfortable. Due the growth of Internet …

Privacy-preserving outsourced classification in cloud computing

P Li, J Li, Z Huang, CZ Gao, WB Chen, K Chen - Cluster Computing, 2018 - Springer
Classifier has been widely applied in machine learning, such as pattern recognition, medical
diagnosis, credit scoring, banking and weather prediction. Because of the limited local …

Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment

K Bhushan, BB Gupta - Journal of Ambient Intelligence and Humanized …, 2019 - Springer
In recent time, software defined networking (SDN) has evolved into a new and promising
networking paradigm. In the SDN-based cloud, the essential features of SDN, including …

Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram

C Yu, J Li, X Li, X Ren, BB Gupta - Multimedia Tools and Applications, 2018 - Springer
A novel four-image encryption scheme based on the quaternion Fresnel transforms (QFST),
computer generated hologram and the two-dimensional (2D) Logistic-adjusted-Sine map …

Differentially private Naive Bayes learning over multiple data sources

T Li, J Li, Z Liu, P Li, C Jia - Information Sciences, 2018 - Elsevier
For meeting diverse requirements of data analysis, the machine learning classifier has been
provided as a tool to evaluate data in many applications. Due to privacy concerns of …