Author:
Kumar Narander,Samriya Jitendra Kumar
Reference21 articles.
1. Sun, Y., Zhang, J., Xiong, Y., Zhu, G.: Data security and privacy in cloud computing. Int. J. Distrib. Sens. Netw., 1–9 (2014)
2. Singh, L.D., Debbarma, T.: A new approach to Elliptic Curve Cryptography. In: International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), 2014. IEEE, India (2014)
3. Abo-alian, A., Badr, N.L., Tolba, M.F.: Authentication as a service for cloud computing. In: Proceedings of the International Conference on Internet of things and Cloud Computing, Article no.5. ACM, United Kingdom (2016)
4. Kalra, S., Sood, S.K.: Secure authentication scheme for IoT and cloud servers. Pervasive Mob. Comput. 24, 210–223 (2015)
5. Jana, B., Poray, J.: Performance analysis on elliptic curve cryptography in network security. In: 2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE). IEEE (2016)