Systematic and critical review of rsa based public key cryptographic schemes: Past and present status
The interconnected digital world is generating enormous data that must be secured from
unauthorized access. Advancement in technologies and new innovative methods applied by …
unauthorized access. Advancement in technologies and new innovative methods applied by …
An effective and enhanced RSA based public key encryption scheme (XRSA)
Cryptography is the mechanism of providing significant security services such as
confidentiality, authentication, and integrity. These services are essentially more important in …
confidentiality, authentication, and integrity. These services are essentially more important in …
Enhanced RSA algorithm with varying key sizes for data security in cloud
IG Amalarethinam, HM Leena - 2017 World Congress on …, 2017 - ieeexplore.ieee.org
Cloud Computing is a distributed and centralized network of inter connected and inter
related systems with one or more IT resources provisioned based on pay-on-demand usage …
related systems with one or more IT resources provisioned based on pay-on-demand usage …
An empirical study of secure and complex variants of RSA scheme
In today's cyber space, where large amounts of data are being exchanged and stored on
remote storages, Cryptography plays a major role. Public key cryptography such as RSA is …
remote storages, Cryptography plays a major role. Public key cryptography such as RSA is …
The AWG|| PSC network: a performance-enhanced single-hop WDM network with heterogeneous protection
Single-hop wavelength-division-multiplexing (WDM) networks based on a central passive
star coupler (PSC) or arrayed-waveguide grating (AWG) hub have received a great deal of …
star coupler (PSC) or arrayed-waveguide grating (AWG) hub have received a great deal of …
Secure Encryption Framework for Multi-Cloud Environments: Leveraging Symmetric and Asymmetric Encryption
TV Reddy, BLN Murthy, JS Bhagavan… - 2023 7th …, 2023 - ieeexplore.ieee.org
Data encryption is the process of turning data into encrypted data. It is a crucial technology
for securing data while it is being stored or transmitted, especially in cloud environments …
for securing data while it is being stored or transmitted, especially in cloud environments …
Multimodal biometrics security system for authentication
A Maheshwari… - 2016 Second International …, 2016 - ieeexplore.ieee.org
Recently biometrics based authentication system provides security from attacks. This paper
presents to implement the biometric system based on the combination of graphical image …
presents to implement the biometric system based on the combination of graphical image …
Chi-Squared Test Analysis on Hybrid Cryptosystem
NH Munshi, P Das, S Maitra - Micro and Nanosystems, 2022 - benthamdirect.com
Nowadays, the internet has reached every aspect of our day-to-day life. The idea of
cryptography is to provide security. It is an encryption technique used for network security …
cryptography is to provide security. It is an encryption technique used for network security …
[PDF][PDF] Enhanced RSA algorithm for data security in cloud
DIG Amalarethinam, HM Leena - International Journal of Control …, 2016 - researchgate.net
In the new era of Computing, the possibility of provisioning resources like operating system,
computing power, memory space, software, platform, etc., on the basis of pay-on-demand …
computing power, memory space, software, platform, etc., on the basis of pay-on-demand …
Digital Signature Algorithm: A Hybrid Approach
HN Prajwal - … Journal of Advanced Computer Science and …, 2023 - search.proquest.com
Security is one of the most important issues in layout of a Digital System. Communication
these days is digital. Consequently, utmost care must be taken to secure the information …
these days is digital. Consequently, utmost care must be taken to secure the information …