2018
DOI: 10.1007/978-981-10-7563-6_12
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic and Secure Authentication Using IKC for Distributed Cloud Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Kumar et al [19] proffered the integrated key cryptosystem (IKC) meant for numerous file sharing with a solitary combined key for sole-consumer data sharing. It was the blend of disparate security schemes in attributes-centered encryption.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…Kumar et al [19] proffered the integrated key cryptosystem (IKC) meant for numerous file sharing with a solitary combined key for sole-consumer data sharing. It was the blend of disparate security schemes in attributes-centered encryption.…”
Section: Literature Surveymentioning
confidence: 99%
“…The username is set to the 128bit length field. After that, split the augmented data into blocks utilizing a 64bit username that is derived as of the current block, centred on the square root of the initial eight prime numbers (2)(3)(4)(5)(6)(7)(8)(9)(10)(11)(12)(13)(14)(15)(16)(17)(18)(19). Next, update the 512-bit buffer utilizing a round constant centred on the cube root of the initial 80 prime numbers .…”
Section: (A) Registrationmentioning
confidence: 99%