Author:
Thewar Premkumar,Tiwari Ankit,Shah Paras,Desai Chirag
Reference9 articles.
1. Stream ciphers: Dead or alive?;A Shamir;'' in Proc. ASIACRYPT,2004
2. CLOAK: A stream cipher-based encryption protocol for mobile computing;Amit Banerjee;IEEE Access,2017
3. Performance analysis of encryption algorithms on mobile devices;B A O Montoya;Proc. 47th Int. Carnahan Conf. Secur. Technol. (ICCST),2013
4. A new lightweight homomorphic encryption scheme for mobile cloud computing;M R Baharon;Proc. IEEE Int. Conf. Comput. Inf. Technol., Ubi Commun., Dependable, Auton. Secure Comput., Pervasive Intell. Com-put. (CIT/IUCC/DASC/PICOM),2015
5. A novel security model for cloud using trusted third party encryption;M Thamizhselvan;Proc. Int. Conf. Innov. Inf., Embedded Commun. Syst. (ICIIECS),2015
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献