Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 12 SI
Page No. 9490 - 9495

Data Security Using Odd-Even Threshold Cryptography in Cloud Computing

Authors : D. Kosare and D. Naidu

References

Bennani, N., E. Damiani and S. Cimato, 2010. Toward cloud-based key management for outsourced databases. Proceedings of the IEEE 34th Annual Workshops on Computer Software and Applications (COMPSACW’10), July 19-23, 2010, IEEE, Seoul, Korea, ISBN:978-1-4244-8089-0, pp: 232-236.

Chachapara, K. and S. Bhadlawala, 2013. Secure sharing with cryptography in cloud computing. Proceedings of the 2013 Nirma University International Conference on Engineering (NUiCONE’13), November 28-30, 2013, IEEE, Ahmedabad, India, ISBN:978-1-4799-0725-0, pp: 1-3.

Harit, S.K., S.K. Saini, N. Tyagi and K.K. Mishra, 2012. RSA Threshold signature based node eviction in vehicular ad hoc network. Inf. Technol. J., 11: 980-988.
Direct Link  |  

Sagar, V. and K. Kumar, 2015. A symmetric key cryptography using genetic algorithm and error back propagation neural network. Proceedings of the 2nd International Conference on Computing for Sustainable Global Development (INDIACom’15), March 11-13, 2015, IEEE, New Delhi, India, ISBN:978-9-3805-4415-1, pp: 1386-1391.

Sanka, S., C. Hota and M. Rajarajan, 2010. Secure data access in cloud computing. Proceedings of the 2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application (IMSAA’10), December 15-17, 2010, IEEE, Bangalore, India, ISBN:978-1-4244-7930-6, pp: 1-6.

Sathishkumar, R. and C. Ramesh, 2016. A modified method for preventing black-hole attack in mobile Ad Hoc networks. J. Eng. Appl. Sci., 11: 182-191.

Shi, J.Y., M. Taifi and A. Khreishah, 2011. Resource planning for parallel processing in the cloud. Proceedings of the 2011 IEEE 13th International Conference on High Performance Computing and Communications (HPCC’11), September 2-4, 2011, IEEE, Banff, Alberta, Canada, ISBN:978-1-4577-1564-8, pp: 828-833.

Yong, Z.H. and H. Zhen, 2007. An efficient authenticated group key agreement protocol. Proceedings of the 41st Annual IEEE International Carnahan Conference on Security Technology, October 8-11, 2007, IEEE, Ottawa, Canada, ISBN:978-1-4244-1129-0, pp: 250-254.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved