2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT) 2019
DOI: 10.1109/icict46931.2019.8977720
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced key establishment technique for secure data access in cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 7 publications
0
7
0
Order By: Relevance
“…Dolphin can change the attack style of the prey school, some prey is attacked and some may be injured then the density of prey could reduce overtime. Then the density is determined as below in Equation (15).…”
Section: Maximum Trust Valuementioning
confidence: 99%
See 1 more Smart Citation
“…Dolphin can change the attack style of the prey school, some prey is attacked and some may be injured then the density of prey could reduce overtime. Then the density is determined as below in Equation (15).…”
Section: Maximum Trust Valuementioning
confidence: 99%
“…Various routing protocol 14,15 is utilized to transfer data from one station to other with low energy. The existing routing algorithm should concentrate either energy efficient (EE) routing or trust based routing for better transmission.…”
Section: Introductionmentioning
confidence: 99%
“…The overall performance of the network is affected by an end-to-end delay. Various techniques, like firefly algorithm (FA), [8][9][10] particle swarm optimization (PSO), and colony optimization (ACO) are implemented to the clustering process. [11][12][13] Here, only the energy conservation problem is addressed and fails to consider the end-to-end delay.…”
Section: Introductionmentioning
confidence: 99%
“…The CT and MRI scanners are generally used, because they revolve around 360 degrees obtain an accurate Region of interest (ROI) from each slice of the medical images 17,18 . Medical images are captured by means of acquisition systems, like magnetic radio waves and crystal sensors, which are used for the indistinguishable arrangement of the human body 19,20 . These acquisition systems generate 2D matrices, which is very intricate.…”
Section: Introductionmentioning
confidence: 99%