2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET) 2017
DOI: 10.1109/icammaet.2017.8186644
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced encryption algorithm (EEA) for protecting users' credentials in public cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…The combination of algorithm provide secure transmission of data to cloud storage. N. Veeraragavan et al [15] has proposed an algorithm to secure cloud storage. This was an uneven encryption algorithm.…”
Section: Literature Surveymentioning
confidence: 99%
“…The combination of algorithm provide secure transmission of data to cloud storage. N. Veeraragavan et al [15] has proposed an algorithm to secure cloud storage. This was an uneven encryption algorithm.…”
Section: Literature Surveymentioning
confidence: 99%
“…Developing and deploying exoskeleton are easy and helps workers in different activities like lifting high weight, relaxing muscles, climb stairs multiple time, standing for long time, or moving object from place to place. [15], [16], and [17] Even though exoskeletons are better technological solution in manual material handling but it also has some challenges like: Availability: Very few companies have claimed for fully functional production exoskeletons for industries that result in to low availability [18]. Price: With the market ratio of demand vs supply the price of the exoskeletons are higher at this time which mar reduce depending upon the actual production of the suits [19].…”
Section: Musculoskeletal Disordermentioning
confidence: 99%
“…It's a kind of challenge where we think that we found the solution of the existing problem than many other challenges which are synonymous come from other different corners which we did not expect. To protect clients data in cloud various algorithms were also used such as [3][4][5] [6]. Existing obfuscation methods were having certain constrains [7].…”
Section: Motivation For the Workmentioning
confidence: 99%