Author:
Kulshrestha Vartika,Verma Seema,Challa R. K.
Reference31 articles.
1. Su Q, Pan Z, Lin K (2016) A new approach with combination of fitting and encryption for transmission. IEEE, pp 446–449
2. Bennasar H, Essaaidi M, Bendahmane A, Ben-othman J (2016) State-of-the-art of the cloud computing cyber-security. IEEE
3. Zhou Z, Tsang KF, Zhao Z, Gaalou W (2016) Data intelligence on the Internet of Things. Springer, Pers Ubiquit Comput.
https://doi.org/10.1007/s00779-016-0912-1
4. Ristenpart T, Yilek S (2013) The mix-and-cut shuffle: small-domain encryption secure against N queries. In: Canetti R, Garay JA (eds) CRYPTO, Part I. LNCS, vol 8042. Springer, pp 392–409
5. Hoang VT, Morris B, Rogaway P (2012) An enciphering scheme based on a card shuffle In: Safavi-Naini R, Canetti R (eds) CRYPTO, LNCS, vol 7417. Springer, pp 1–13
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Securing Cloud from Data Misconfiguration using Cryptographic Techniques;2022 International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON);2022-12-23