Conversational Artificial Intelligence 2024
DOI: 10.1002/9781394200801.ch1
|View full text |Cite
|
Sign up to set email alerts
|

A Glance View on Cloud Infrastructures Security and Solutions

Srinivasa Rao Gundu,
Charanarur Panem,
J. Vijaylaxmi
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…"x" refers to the key's length, which is maintained constant in the proposed technique K [7]. Following acquiring the key, K[7] will be indexed using Equation (1). Various algorithms (Algorithm 1 to Algorithm 5) have been developed to convert plaintext to ciphertext, as shown in Figure 6.…”
Section: Swjk Key Generator Algorithmmentioning
confidence: 99%
See 4 more Smart Citations
“…"x" refers to the key's length, which is maintained constant in the proposed technique K [7]. Following acquiring the key, K[7] will be indexed using Equation (1). Various algorithms (Algorithm 1 to Algorithm 5) have been developed to convert plaintext to ciphertext, as shown in Figure 6.…”
Section: Swjk Key Generator Algorithmmentioning
confidence: 99%
“…Index [m] will contain the values of the test-related indexes i[1] and i [3]. First, the first value will be obtained from Index i [1] and utilized for testing. A second value will be obtained from Index i [3] for testing.…”
Section: Apply the Swjk Algorithm On [δ1] For The Values Of Index [M]...mentioning
confidence: 99%
See 3 more Smart Citations