-
101
An anti virus scheme using digital signature and anomaly detection techniques
Published 2003“…In the scheme, newly downloaded files that have been digitally signed using SHA-l and RSA algorithms are verified at the first layer. Here the source and integrity of the files are determined and the executables with authentic and genuine signatures are accepted and logged into a watch list. …”
Get full text
Thesis -
102
Ensuring confidentiality and privacy of cloud data using a non-deterministic cryptographic scheme
Published 2023-01-01“…A comparative analysis of the NCS was performed against AES, DES, and RSA algorithms based on key sizes of 128kb, 256kb, and 512kb using the dataset from Kaggle. …”
Get full text
Article -
103
Ensuring confidentiality and privacy of cloud data using a non-deterministic cryptographic scheme.
Published 2023-01-01“…A comparative analysis of the NCS was performed against AES, DES, and RSA algorithms based on key sizes of 128kb, 256kb, and 512kb using the dataset from Kaggle. …”
Get full text
Article -
104
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…It is not done only by encrypting it but also providing access to the data only on successful authentication. ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Thesis -
105
A Secure, Reliable and Low-Cost Distributed Storage Scheme Based on Blockchain and IPFS for Firefighting IoT Data
Published 2023-01-01“…In addition, we use the AES and RSA algorithms to ensure the security of firefighting IoT data storage and transmission. …”
Get full text
Article