2014 International Conference on Communication and Network Technologies 2014
DOI: 10.1109/cnt.2014.7062777
|View full text |Cite
|
Sign up to set email alerts
|

Performance analysis of enhanced secure socket layer protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…According to authors in [12] recommended encryption and decryption techniques for accessing data within the cloud. In this regard, the security approach uses a Ciphertext-Policy-Attribute-Based Encryption (CPABE), which is based on an Elliptic Curve Cryptography (ECC), Attribute-Based Encryption (ABE), and Bilinear Maps.…”
Section: Privacy and Security Issuesmentioning
confidence: 99%
See 1 more Smart Citation
“…According to authors in [12] recommended encryption and decryption techniques for accessing data within the cloud. In this regard, the security approach uses a Ciphertext-Policy-Attribute-Based Encryption (CPABE), which is based on an Elliptic Curve Cryptography (ECC), Attribute-Based Encryption (ABE), and Bilinear Maps.…”
Section: Privacy and Security Issuesmentioning
confidence: 99%
“…Therefore, the Role-Based Access Control (RBAC) cryptographic approaches have so far been developed in order to include the cryptographic nature of the access control and approaches to protect and secure the protected data in the Cloud. In this regard, RBAC enables the data owners to share and manage individual data in the Cloud [12]. The majority of the IoT devices are often small and wirelessly connected.…”
Section: Privacy and Security Issuesmentioning
confidence: 99%