2023
DOI: 10.32604/csse.2023.029040
|View full text |Cite
|
Sign up to set email alerts
|

Graph-Based Replication and Two Factor Authentication in Cloud Computing

Abstract: Many cutting-edge methods are now possible in real-time commercial settings and are growing in popularity on cloud platforms. By incorporating new, cutting-edge technologies to a larger extent without using more infrastructures, the information technology platform is anticipating a completely new level of development. The following concepts are proposed in this research paper: 1) A reliable authentication method Data replication that is optimised; graph-based data encryption and packing colouring in Redundant … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…The foundation for responsible innovation is laid by highlighting the significance of toxicity data in the early phases of corrosion inhibitor research. 40,41 It represents a dedication to developing technology that addresses the direct problems associated with corrosion, while also advancing ecological responsibility and sustainability in the long run.…”
Section: Critical Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The foundation for responsible innovation is laid by highlighting the significance of toxicity data in the early phases of corrosion inhibitor research. 40,41 It represents a dedication to developing technology that addresses the direct problems associated with corrosion, while also advancing ecological responsibility and sustainability in the long run.…”
Section: Critical Reviewmentioning
confidence: 99%
“…toxicity (LC 50 /EC 50 ), biodegradability and bioaccumulation ( K OW or D OW ) and the environment and human health) in corrosion inhibition investigations. 40,41 The utilization of toxicology data is essential to guaranteeing that the corrosion inhibitors employed in different industries are appropriate for human health, the environment, and corrosion prevention. 42,43 To reduce any possible impact on ecosystems and human health, researchers and developers can make well-informed decisions by evaluating the toxicity of corrosion inhibitors.…”
Section: Introductionmentioning
confidence: 99%