2016 6th International Conference - Cloud System and Big Data Engineering (Confluence) 2016
DOI: 10.1109/confluence.2016.7508111
|View full text |Cite
|
Sign up to set email alerts
|

Secure algorithm for cloud computing and its applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 23 publications
(11 citation statements)
references
References 27 publications
0
11
0
Order By: Relevance
“…The key length is decided by the number of bits in the module. RSA algorithm [4] consists of three stages like Key generation, Encryption, and Decryption.…”
Section: B Rsa Algorithmmentioning
confidence: 99%
“…The key length is decided by the number of bits in the module. RSA algorithm [4] consists of three stages like Key generation, Encryption, and Decryption.…”
Section: B Rsa Algorithmmentioning
confidence: 99%
“…Intel Pentium® Dual Core with Windows XP [2]. Intel Pentium® Dual Core with Windows Vista and [3]. Intel Pentium® Dual Core with Windows 7.…”
Section: System Parametersmentioning
confidence: 99%
“…The receiver obtains the original message with the private key matching to the identity. Akshita Bhandari [15] et al proposed a hybrid encryption RSA along with Advanced Encryption Standard (AES) to ensure efficiency, consistency and trustworthiness in cloud servers. The authors use various cryptography concepts during communication along with its application in cloud computing and to enhance the security of cipher text or encrypted data in cloud servers along with minimizing the consumption of time, cost and memory size during encryption and decryption.…”
Section: Related Workmentioning
confidence: 99%