Author:
Balajee R. M.,Jayanthi Kannan M. K.,Murali Mohan V.
Publisher
Springer Nature Singapore
Reference22 articles.
1. J.V. Chandra, N. Challa, S.K. Pasupuletti, Authentication and Authorization Mechanism for Cloud Security
2. R.M. Balajee, H. Mohapatra, K. Venkatesh, A comparative study on efficient cloud security, services, simulators, load balancing, resource scheduling and storage mechanisms. IOP Conf. Ser. Mater. Sci. Eng. 1070(1), 012053 (2021)
3. B. Srikanth, M.S. Kumar, J.V. Ravindra, K.H. Kishore, The enhancement of security measures in advanced encryption standard using double precision floating point multiplication model. Trans. Emerging Telecommun. Technol. 31(12), e3948 (2020)
4. K.A. Reddy, Network security using notable cryptographic algorithm for IoT data. Int. J. 8(5) (2020)
5. G.S. Prasad, D.L. Praneetha, S. Srivalli, B.V. Sukesh, Information security in cloud by using enhanced triple-DES encryption algorithm. Int. J. Innov. Technol. Exploring Eng. 8(5), 679–682 (2019)