Metaverse security and privacy: An overview
Z Chen, J Wu, W Gan, Z Qi - … Conference on Big Data (Big Data …, 2022 - ieeexplore.ieee.org
Metaverse is a living space and cyberspace that realizes the process of virtualizing and
digitizing the real world. It integrates a plethora of existing technologies with the goal of …
digitizing the real world. It integrates a plethora of existing technologies with the goal of …
Cryptography algorithms for enhancing IoT security
In today's fast-paced world, a new technology paradigm known as the Internet of Things
(IoT) is advancing every business. It provides communication between the digital and …
(IoT) is advancing every business. It provides communication between the digital and …
[HTML][HTML] A Novel Effective Lightweight Homomorphic Cryptographic Algorithm for data security in cloud computing
Cloud computing is a technology in which the resources are delivered as services. Users
can access them anywhere, anytime via the Internet without any need to know the …
can access them anywhere, anytime via the Internet without any need to know the …
A hybrid encryption solution to improve cloud computing security using symmetric and asymmetric cryptography algorithms
H Abroshan - … Journal of Advanced Computer Science and …, 2021 - search.proquest.com
Ensuring the security of cloud computing is one of the most critical challenges facing the
cloud services sector. Dealing with data in a cloud environment, which uses shared …
cloud services sector. Dealing with data in a cloud environment, which uses shared …
Investigating factors influencing individual user's intention to adopt cloud computing: a hybrid approach using PLS-SEM and fsQCA
Purpose The main objective of this study is to investigate the factors that influence the
adoption intention of cloud computing services among individual users using the extended …
adoption intention of cloud computing services among individual users using the extended …
Privacy-aware genetic algorithm based data security framework for distributed cloud storage
An increased use of data driven applications and integrated systems have caused an
accelerating expansion in data volumes and increase in the number of digital records, over …
accelerating expansion in data volumes and increase in the number of digital records, over …
Implication of lightweight and robust hash function to support key exchange in health sensor networks
M Al-Zubaidie - Symmetry, 2023 - mdpi.com
Internet of Things (IoT) applications are critical for the fast delivery of health information/data
in different environments. The wireless sensor network (WSN) can be used within IoT …
in different environments. The wireless sensor network (WSN) can be used within IoT …
[HTML][HTML] A new lightweight data security system for data security in the cloud computing
In recent decades, data has proved indispensable to all facets of human existence. The
development of several applications has resulted in the exponential expansion of data. This …
development of several applications has resulted in the exponential expansion of data. This …
An efficient and secure key management with the extended convolutional neural network for intrusion detection in cloud storage
S Ahmad, S Mehfuz, J Beg - Concurrency and Computation …, 2023 - Wiley Online Library
Cloud computing aids users for storing and recovering their information everywhere in the
world. Security and efficiency are the two main issues in cloud service. Numerous intrusion …
world. Security and efficiency are the two main issues in cloud service. Numerous intrusion …
Ensuring privacy and confidentiality of cloud data: A comparative analysis of diverse cryptographic solutions based on run time trend
The cloud is becoming a hub for sensitive data as technology develops, making it
increasingly vulnerable, especially as more people get access. Data should be protected …
increasingly vulnerable, especially as more people get access. Data should be protected …