2019 International Carnahan Conference on Security Technology (ICCST) 2019
DOI: 10.1109/ccst.2019.8888439
|View full text |Cite
|
Sign up to set email alerts
|

A novel data ciphering method for secure cloud storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(8 citation statements)
references
References 2 publications
0
8
0
Order By: Relevance
“…The below Fig. 2 Explain the Right half encryption data flow [15].  Left half/AES encryption step: To cipher, the left half text is direct to the AES algorithm.…”
Section: Proposed Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…The below Fig. 2 Explain the Right half encryption data flow [15].  Left half/AES encryption step: To cipher, the left half text is direct to the AES algorithm.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…The DSEM uses the same key for encryption and decryption. [15] DSEM key generation: Initially, the key value is fixed as the ASCII value of given user plaint text. Then we add that key value with increment variable so each and every time we get different key value and there is no repetition will occur for the same letter.…”
Section: Dsem Algorithmsmentioning
confidence: 99%
See 3 more Smart Citations