2016 International Conference on Communication and Electronics Systems (ICCES) 2016
DOI: 10.1109/cesys.2016.7889894
|View full text |Cite
|
Sign up to set email alerts
|

Protection on sensitive information in cloud — Cryptography algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…The user can monitor and manage the vehicle accessories by installing the system interface on a mobile phone during the testing stage. The system's effectiveness, adaptability, and breadth of functionality have been demonstrated with the use of various car accessories [16]. Conclusion: This project includes developing a novel technology to lower interior vehicle temperatures that are harmful to the driver's health and to enable the driver to operate some automotive accessories using a mobile phone.…”
Section: Bluetooth Wireless Monitoring Managing and Control For Inter...mentioning
confidence: 99%
“…The user can monitor and manage the vehicle accessories by installing the system interface on a mobile phone during the testing stage. The system's effectiveness, adaptability, and breadth of functionality have been demonstrated with the use of various car accessories [16]. Conclusion: This project includes developing a novel technology to lower interior vehicle temperatures that are harmful to the driver's health and to enable the driver to operate some automotive accessories using a mobile phone.…”
Section: Bluetooth Wireless Monitoring Managing and Control For Inter...mentioning
confidence: 99%
“…Harikrishna et al [1] Service in Internet-based access to use as a paid, and is managed in the cloud IT industry. In particular, for every organization the website is reliable; however, the information should flow but not contain the information [6]. B. Harikrishna et al When sensitive information is stored in the public domain, problems arise when consumers leave the environment altogether because they are not sure that the information is on the cloud [10].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Privacy means that information is understandable to everyone else, that it can be trashed. It helps to submit unauthorized permission for sensitive information [6]. Availability refers to the guarantee that the user has access to information and to all systems at the same time.…”
Section: Introductionmentioning
confidence: 99%