Author:
Nithisha J.,Jesu Jayarin P.
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference25 articles.
1. Kavin, B. P., & Ganapathy, S. (2019). A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications. Computer Networks, 151, 181–190.
2. Elumalaivasan, P., Kulothungan, K., Ganapathy, S., & Kannan, A. (2016). Trust based ciphertext policy attribute based encryption techniques for decentralized disruption tolerant networks. Australian Journal of Basic and Applied Sciences, 10(2), 18–26.
3. Kendrekar, P. P., & Chavan, M. K. (2016). Cryptographic implementation of aggregate-key encryption for data sharing in cloud storage. In 2016 IEEE international conference on recent trends in electronics, information & communication technology (RTEICT) (pp. 829–832).
4. Potey, M. M., Dhote, C. A., & Sharma, D. H. (2016). Efficient homomorphic encryption using ECC-ElGamal scheme for cloud data. In 3rd international conference on electrical, electronics, engineering trends, communication, optimization and sciences (EEECOS 2016) (pp. 1–5).
5. Alrawais, Alhothaily, A., Hu, C., Xing, X., & Cheng, X. (2017). An attribute-based encryption scheme to secure fog communications. IEEE Access, 5, 9131–9138.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献