2022
DOI: 10.32604/cmc.2022.029609
|View full text |Cite
|
Sign up to set email alerts
|

Encryption Algorithm for Securing Non-Disclosure Agreements in Outsourcing Offshore Software Maintenance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…This concept has been covered in a lot of published literature. The literature can be enhanced with cloud and machine learning areas [13][14][15][16][17]. There exist different related studies which are close to the current research work.…”
Section: Related Workmentioning
confidence: 54%
“…This concept has been covered in a lot of published literature. The literature can be enhanced with cloud and machine learning areas [13][14][15][16][17]. There exist different related studies which are close to the current research work.…”
Section: Related Workmentioning
confidence: 54%
“…O and E are Average of O and E elements respectively. For a well-hidden technique, it must be that the correlation coefficient is a little between neighboring bytes in the encrypted data [29].…”
Section: Correlation Coefficient Analysismentioning
confidence: 99%
“…Image cryptographers have produced tens of hundreds of image cryptosystems using the constructs of DNA [3], [4], automatons [5], mathematical figures [6], [7], non-disclosure agreements [8], puzzles [9], chess pieces [10], magic squares [11], [12], optics [13], [14] etc. For example the work [15] developed 2D Hénon-Sine map (2D-HSM) and applied this map in spawning the chaotic data.…”
Section: Introductionmentioning
confidence: 99%