[1]
|
A Systematic Literature Review on Symmetric and Asymmetric Encryption Comparison Key Size
2023 3rd International Conference on Smart Data Intelligence (ICSMDI),
2023
DOI:10.1109/ICSMDI57622.2023.00027
|
|
|
[2]
|
The New Advanced Society
2022
DOI:10.1002/9781119884392.ch2
|
|
|
[3]
|
Lightweight blockchain fuzzy decision scheme through MQTT and Fibonacci for sustainable transport
Mathematical Biosciences and Engineering,
2022
DOI:10.3934/mbe.2022556
|
|
|
[4]
|
Addressing Cloud Security Challenges through Blockchain Technology
2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO),
2022
DOI:10.1109/ICRITO56286.2022.9964758
|
|
|
[5]
|
Addressing Cloud Security Challenges through Blockchain Technology
2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO),
2022
DOI:10.1109/ICRITO56286.2022.9964758
|
|
|
[6]
|
Enhancing the RSA algorithm using DH principles towards CIA compliance
2021 3rd International Multidisciplinary Information Technology and Engineering Conference (IMITEC),
2021
DOI:10.1109/IMITEC52926.2021.9714654
|
|
|
[7]
|
Intelligent Computing and Networking
Lecture Notes in Networks and Systems,
2021
DOI:10.1007/978-981-15-7421-4_25
|
|
|
[8]
|
A public key cryptosystem and signature scheme based on numerical series
SN Applied Sciences,
2020
DOI:10.1007/s42452-019-1928-8
|
|
|
[9]
|
Blockchain technology: Is it hype or real in the construction industry?
Journal of Industrial Information Integration,
2020
DOI:10.1016/j.jii.2020.100125
|
|
|
[10]
|
Restricting Data Sharing and Collection of Facial Recognition Data by the Consent of the User: A Systems Analysis
2020 Systems and Information Engineering Design Symposium (SIEDS),
2020
DOI:10.1109/SIEDS49339.2020.9106661
|
|
|
[11]
|
Improving secured ID-based authentication for cloud computing through novel hybrid fuzzy-based homomorphic proxy re-encryption
Soft Computing,
2020
DOI:10.1007/s00500-020-05119-9
|
|
|
[12]
|
A Secure Cloud Computing Authentication Using Cryptography
2018 International Conference on Emerging Trends and Innovations In Engineering And Technological Research (ICETIETR),
2018
DOI:10.1109/ICETIETR.2018.8529100
|
|
|
[13]
|
A multilevel encryption technique in cloud security
2017 7th International Conference on Communication Systems and Network Technologies (CSNT),
2017
DOI:10.1109/CSNT.2017.8418541
|
|
|