[HTML][HTML] Survey on public key cryptography scheme for securing data in cloud computing
J Athena, V Sumathy - Circuits and Systems, 2017 - scirp.org
Numerous advancements in the Information Technology (IT) require the proper security
policy for the data storage and transfer among the cloud. With the increase in size of the …
policy for the data storage and transfer among the cloud. With the increase in size of the …
A hybrid encryption algorithm based on RSA and Diffie-Hellman
S Gupta, J Sharma - 2012 IEEE International Conference on …, 2012 - ieeexplore.ieee.org
Internet and Network applications have seen a tremendous growth in the last decade. As a
result incidents of cyber attacks and compromised security are increasing. This requires …
result incidents of cyber attacks and compromised security are increasing. This requires …
Built-in encrypted health cloud environment for sharing COVID-19 data
MY Shakor, NMS Surameery - 2021 3rd International …, 2021 - ieeexplore.ieee.org
During the COVID-19 pandemic, the increasing amount of personal and sensitive data
collected in the healthcare inistiutions, make it necessary to use the cloud not only to store …
collected in the healthcare inistiutions, make it necessary to use the cloud not only to store …
[PDF][PDF] Comparison of asymmetric algorithms in cryptography
N Garg, P Yadav - J. Comput. Sci. Mob. Comput.(IJCSMC), 2014 - academia.edu
In this paper we compare asymmetric algorithm like (RSA, Elliptic curve, OAEP) which is
used for security when data is transmitting over the network. These algorithms are based on …
used for security when data is transmitting over the network. These algorithms are based on …
Methods toward enhancing RSA algorithm: a survey
SS Al-Kaabi - Available at SSRN 3819524, 2019 - papers.ssrn.com
Cryptography defines different methods and technologies used in ensuring communication
between two parties over any communication medium is secure, especially in presence of a …
between two parties over any communication medium is secure, especially in presence of a …
A comprehensive study on various modifications in RSA algorithm
GR Patel, K Panchal, SR Patel - International Journal of Engineering …, 2014 - rjwave.org
Cryptography is derived from a Greek word which means the art of protecting information by
converting it into an unreadable format. In order to prevent some unwanted users or people …
converting it into an unreadable format. In order to prevent some unwanted users or people …
Hybrid encryption algorithm based improved RSA and Diffie-Hellman
R Bodkhe, V Jethani - International Journal of Engineering …, 2015 - indianjournals.com
Internet and Network applications have seen a tremendous growth in the last decade. As a
result incidents of cyber attacks and compromised security are increasing. This requires …
result incidents of cyber attacks and compromised security are increasing. This requires …
[PDF][PDF] A Study on Asymmetric Key Exchange Authentication Protocols
DDSR Murthy, B Madhuravani… - International Journal of …, 2012 - academia.edu
Key exchange protocols enable the use of sharedkey cryptography to protect transmitted
data over insecure networks. The key exchange protocols are classified into i) symmetric ii) …
data over insecure networks. The key exchange protocols are classified into i) symmetric ii) …
[PDF][PDF] ASurvey ON ENHANCED RSA ALGORITHMS
SS Al-Kaabi, SB Belhaouari - CS & IT Conference Proceedings, 2019 - csitcp.com
Cryptography is a field in computer science and mathematics that entails techniques of
securing communication between two parties in the presence of a third party. This is …
securing communication between two parties in the presence of a third party. This is …
A Study on Encryption and Decryption System
S Goyal - 2021 - papers.ssrn.com
The presented document aims to review the methodologies used for cryptography.
Cryptography, a Greek word meaning'protected data with an unreadable format'has become …
Cryptography, a Greek word meaning'protected data with an unreadable format'has become …