Cargando…
A chaos theory inspired, asynchronous two-way encryption mechanism for cloud computing
Data exchange over the Internet and other access channels is on the rise, leads to the insecurity of consequences. Many experiments have been conducted to investigate time-efficient and high-randomized encryption methods for the data. The latest studies, however, have still been debated because of d...
Autores principales: | Peechara, Ravinder Rao, V, Sucharita |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
PeerJ Inc.
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8372001/ https://www.ncbi.nlm.nih.gov/pubmed/34458569 http://dx.doi.org/10.7717/peerj-cs.628 |
Ejemplares similares
-
A new SLA-aware method for discovering the cloud services using an improved nature-inspired optimization algorithm
por: Heidari, Arash, et al.
Publicado: (2021) -
A strong construction of S-box using Mandelbrot set an image encryption scheme
por: Aslam, Mazzamal, et al.
Publicado: (2022) -
Efficiency aware scheduling techniques in cloud computing: a descriptive literature review
por: Usman Sana, Muhammad, et al.
Publicado: (2021) -
Real-time DDoS flood attack monitoring and detection (RT-AMD) model for cloud computing
por: Bamasag, Omaimah, et al.
Publicado: (2022) -
Actuator behaviour modelling in IoT-Fog-Cloud simulation
por: Markus, Andras, et al.
Publicado: (2021)