1 |
H. Abwnawar & R. S. Janicke. (2017, July). Towards location-aware access control and data privacy in inter-cloud communications. IEEE EUROCON 2017-17th International Conference on Smart Technologies (pp. 739-744). Macedonia : IEEE DOI : 10.1109/EUROCON.2017.8011209
|
2 |
J. J. Yang, J. Q. Li & Y. Niu. (2015). A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Generation Computer Systems. 43(44), 74-86. DOI : 10.1016/j.future.2014.06.004
|
3 |
D. P. Gayathri. (2013). Overview of RSA and its enhancements. International Journal of Innovative Research and Development, 2(11), 306-310.
|
4 |
S. Nagaraj, Dr. G. S. V. P. Raju & V. Srinadth. (2015). Data Encryption and Authentication Using Public Key Approach. Elsevier Procedia Computer Science. 48, 126-132. DOI : 10.1016/j.procs.2015.04.161
DOI
|
5 |
A. K. Dubey, A. K. Dubey, M. Namdev & S. S. Shrivastava. (2016, November). Cloud-User Security Based on RSA and MD5 Algorithm for Resource Attestation and Sharing in Java Environment. IEEE (pp. 1-8). Indore : IEEE. DOI : 10.1109/CONSEG.2012.6349503
|
6 |
P. Yellapa, C. Narasimham & V. Sreenivas. (2013). Data Security in Cloud using RSA. IEEE. p. 1-6. DOI : 10.1109/ICCCNT.2013.6726471
|
7 |
V. V. S. Mahalle & A. K. Shahade. (2016). Enhancing the data security in Cloud by implementing Hybrid (Rsa & Aes) Encryption Algorithm. IEEE. 146-149. DOI : 10.1109/INPAC.2014.6981152
|
8 |
A. Kahate. (2010). Cryptography and Network Security. Tata McGraw Hill Education Private Ltd., New Delhi.
|
9 |
N. Khanezaei & Z. M. Hanapi. (2016). A framework based on RSA and AES encryption algorithms for cloud computing services. IEEE. 58-62. DOI : 10.1109/SPC.2014.7086230
|
10 |
A. Priya, Y. K. Rana & B. P. Patel. (2015). Design and Implementation of an Algorithm to Enhance Cloud Security. International Journal of Computer Applications. 113(12), 41-46. DOI : 10.5120/19882-1896
DOI
|
11 |
G. L. Prakash, Dr. M. Prateek & Dr. I. Singh. (2014). Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System. International Journal Of Engineering And Computer Science. 3(4), 5216-5223. DOI : 10.1109/ICSPCT.2014.6884895
|
12 |
S. Verma & D. Garg. (2015). Improvement in Rebalanced CRT RSA. The International Arab Journal of Information Technology. 12(6), 524-531.
|
13 |
Y. S. Jeong, Y. T. Kim & G. C. Park. (2017). A hierarchical property-based multi-level approach method for improves user access control in a cloud environment. Journal of the Korea Convergence Society. 8(11), 7-13.
DOI
|
14 |
Y. S. Jeong & Y. H. Yon. (2018). User privacy protection model through enhancing the administrator role in the cloud environment. Journal of Convergence for Information Technology. 8(3), 79-84
DOI
|
15 |
Y. S. Jeong. (2018). User Privacy Security Scheme using Double Replication Key in the Cloud Environment. Journal of the Korea Convergence Society. 9(4), 9-14.
DOI
|