Skip to Main Content
Keywords: Encryption
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
International Journal of Pervasive Computing and Communications (2024) 20 (5): 607–619.
Published: 13 October 2022
... unauthorized users to improve its security. Therefore, several key generations, encryption and decryption algorithms are developed for data privacy preservation in the cloud environment. Still, the outsourced data remains with the problems like minimum data security, time consumption and increased...
Journal Articles
International Journal of Pervasive Computing and Communications (2023) 19 (2): 173–190.
Published: 17 June 2021
... controls of the information system. Finally, the data is decrypted in the data sharing phase for sharing data and for achieving data privacy for confidential data. Additionally, dynamic splicing is utilized, and the security functions, such as hashing, Elliptic Curve Cryptography (ECC), Data Encryption...

or Create an Account

Close Modal
Close Modal