Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …
Cryptography (ECC). EC is often used to improve the security of open communication …
Data security and privacy protection for cloud storage: A survey
P Yang, N Xiong, J Ren - Ieee Access, 2020 - ieeexplore.ieee.org
The new development trends including Internet of Things (IoT), smart city, enterprises digital
transformation and world's digital economy are at the top of the tide. The continuous growth …
transformation and world's digital economy are at the top of the tide. The continuous growth …
Secure attribute-based data sharing for resource-limited users in cloud computing
Data sharing becomes an exceptionally attractive service supplied by cloud computing
platforms because of its convenience and economy. As a potential technique for realizing …
platforms because of its convenience and economy. As a potential technique for realizing …
A survey on cloud computing security: Issues, threats, and solutions
Over the internet, the cloud computing reveals a remarkable potential to provide on-demand
services to consumers with greater flexibility in a cost effective manner. While moving …
services to consumers with greater flexibility in a cost effective manner. While moving …
Security in Internet of Things: issues, challenges, taxonomy, and architecture
V Adat, BB Gupta - Telecommunication Systems, 2018 - Springer
Internet technology is very pervasive today. The number of devices connected to the
Internet, those with a digital identity, is increasing day by day. With the developments in the …
Internet, those with a digital identity, is increasing day by day. With the developments in the …
Defending against phishing attacks: taxonomy of methods, current issues and future directions
BB Gupta, NAG Arachchilage, KE Psannis - Telecommunication Systems, 2018 - Springer
Internet technology is so pervasive today, for example, from online social networking to
online banking, it has made people's lives more comfortable. Due the growth of Internet …
online banking, it has made people's lives more comfortable. Due the growth of Internet …
Privacy-preserving outsourced classification in cloud computing
Classifier has been widely applied in machine learning, such as pattern recognition, medical
diagnosis, credit scoring, banking and weather prediction. Because of the limited local …
diagnosis, credit scoring, banking and weather prediction. Because of the limited local …
Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment
K Bhushan, BB Gupta - Journal of Ambient Intelligence and Humanized …, 2019 - Springer
In recent time, software defined networking (SDN) has evolved into a new and promising
networking paradigm. In the SDN-based cloud, the essential features of SDN, including …
networking paradigm. In the SDN-based cloud, the essential features of SDN, including …
Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram
C Yu, J Li, X Li, X Ren, BB Gupta - Multimedia Tools and Applications, 2018 - Springer
A novel four-image encryption scheme based on the quaternion Fresnel transforms (QFST),
computer generated hologram and the two-dimensional (2D) Logistic-adjusted-Sine map …
computer generated hologram and the two-dimensional (2D) Logistic-adjusted-Sine map …
Differentially private Naive Bayes learning over multiple data sources
For meeting diverse requirements of data analysis, the machine learning classifier has been
provided as a tool to evaluate data in many applications. Due to privacy concerns of …
provided as a tool to evaluate data in many applications. Due to privacy concerns of …