A cloud based secured fully anonymous HMAC encryption algorithm in comparison with diffie Hellman algorithm for improved key exchange
Author:
Kumaran G. J.,Logu K.
Reference49 articles.
1. High throughput implementation of the new secure hash algorithm through partial unrolling
2. Anitha, K., et al. "A Framework to Reduce Category Proliferation in Fuzzy ARTMAP Classifiers Adopted for Image Retrieval Using Differential Evolution Algorithm." Multimedia Tools and Applications, vol. 79, no. 5-6, Springer Science and Business Media LLC, Feb. 2020, pp. 4217–38.
3. Anitha Kumari, S., and S. Srinivasan. "Ash Fouling Monitoring and Soot-Blow Optimization for Reheater in Thermal Power Plant." Applied Thermal Engineering, vol. 149, Elsevier BV, Feb. 2019, pp. 62–72.
4. Security concerns and risk at different levels in Cloud Computing
5. Comparison between Cloud Sim and Green Cloud in Measuring Energy Consumption in a Cloud Environment