Publisher
Springer Nature Switzerland
Reference24 articles.
1. Al-Shabi, M.: A survey on symmetric and asymmetric cryptography algorithms in information security. Int. J. Sci. Res. Publ. (IJSRP) 9(3), 576–589 (2019)
2. Ateeq, K., Pradhan, M.R., Mago, B., Ghazal, T.: Encryption as a service for multi-cloud environment. Int. J. Adv. Res. Eng. Technol. (IJARET) 11(7), 622–628 (2020)
3. Lecture Notes in Computer Science;J Blömer,2018
4. Deb, P.K., Mukherjee, A., Misra, S.: CEaaS: constrained encryption-as-a-service in fog-enabled IoT. IEEE Internet Things J. 9, 19803–19810 (2022)
5. Ibtihal, M., Hassan, N.: Homomorphic encryption as a service for outsourced images in mobile cloud computing environment. In: Cryptography: Breakthroughs in Research and Practice, pp. 316–330. IGI Global (2020)