Open Access
Issue |
E3S Web Conf.
Volume 391, 2023
4th International Conference on Design and Manufacturing Aspects for Sustainable Energy (ICMED-ICMPC 2023)
|
|
---|---|---|
Article Number | 01015 | |
Number of page(s) | 9 | |
DOI | https://doi.org/10.1051/e3sconf/202339101015 | |
Published online | 05 June 2023 |
- Poonam Jindal and Brahmjit Singh, “A Survey on RC4 Stream Cipher”, International Journal of Computer Network and Information Security 7(7):37–45, June 2015. [CrossRef] [Google Scholar]
- Scott Fluhrer, Itsik Mantin and Adi Shamir. “Weaknesses in the Key Scheduling Algorithm of RC”, January 2005. [Google Scholar]
- Hakan Hacıgumus, Bala Iyer, Chen Li and Sharad Mehrotra, “Executing SQL over Encrypted Data in the Database-Service-Provider Model”, 2002 ACM SIGMOD International Conference on Management of Data, June 2002. [Google Scholar]
- Sourav Mukherjee, “Popular SQL Server Database Encryption Choices”, International Journal of Computer Trends and Technology (IJCTT), Volume-66 Number-1, December 2018. [Google Scholar]
- Ahmed Albugmi, Madini O. Alassafi, Robert John Walters and Gary Wills, “Data Security in Cloud Computing”, Fifth International Conference on Future Generation Communication Technologies (FGCT), IEEE, Volume: 1, August 2016. [Google Scholar]
- Ako Muhammad Abdullah, “Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data”, June, 2017. [Google Scholar]
- Nishtha Mathur and Rajesh Bansode, “AES Based Text Encryption Using 12 Rounds with Dynamic Key Selection”, Procedia Computer Science, Volume 79, Pages 1036–1043, 2016. [CrossRef] [Google Scholar]
- Isnar Sumartono, Andysah Putera Utama Siahaan and Nova Mayasari, “An Overview of the RC4 Algorithm”, IOSR Journal of Dental and Medical Sciences 18(6):2278–2661, December 2016. [Google Scholar]
- M. Pitchaiah, Philemon Daniel and Praveen, “Implementation of Advanced Encryption Standard Algorithm”, International Journal of Scientific & Engineering Research Volume 3, Issue 3, 1 ISSN 2229-5518, March 2012. [Google Scholar]
- Tharindu Weerasinghe, “An Effective RC4 Stream Cipher”, 8th IEEE International Conference on Industrial and Information Systems (ICIIS), December 2013. [Google Scholar]
- GeeksforGeeks - RC4 encryption, Updated - October 2021. [Google Scholar]
- Srinu Banothu, Govardhan, A. and Karnam Madhavi, “Performance Evaluation of Cloud Database Security Algorithms”, E3S Web Conf. Volume 309, 2021, 3rd International Conference on Design and Manufacturing Aspects for Sustainable Energy (ICMED- ICMPC 2021), October 2021. [Google Scholar]
- Toa Bi Irie Guy-Cedric and Suchithra, R., “A Comparative Study on AES 128 BIT AND AES 256 BIT”, International Journal of Scientific Research in Computer Science and Engineering Vol.6, Issue.4, pp.30–33, August 2018. [CrossRef] [Google Scholar]
- Nur Atikah, Mutia Rizky Ashila, De Rosal Ignatius Moses Setiadi, Eko Hari Rachmawanto and Christy Atika Sari, “AES-RC4 Encryption Technique to Improve File Security”, Fourth International Conference on Informatics and Computing (ICIC), IEEE, October 2019. [Google Scholar]
- Harrison John Bhatti and Babak Bashari Rad, “Databases in Cloud Computing: A Literature Review”, International Journal of Information Technology and Computer Science 9(4):9–17, April 2017. [CrossRef] [Google Scholar]
- Fizza Shahid, Humaira Ashraf, Anwar Ghani, Shahbaz Ahmed Khan, Ghayyur1, Shahaboddin Shamshirband 2, And Ely Salwana 3, “PSDS-Proficient Security, Over Distributed Storage: A Method for Data Transmission in Cloud”, IEEE Access, VOLUME 8, Pg. No 118285–118295, 2020. [Google Scholar]
- Srinu Banothu, A. Govardhan, Karnam, Madhavi, “Performance Comparison of Cryptographic Algorithms for Data Security in Cloud Computing”, Journal of Information and Computational Science, ISSN: 1548-7741, Volume 11 Issue 9-2021, Pg. No 1–8. [Google Scholar]
- Amjad Alsirhani, Srinivas Sampalli, Peter Bodorik, “Improving Database Security in Cloud Computing by Fragmentation of Data”, International Conference on Computer and Applications (ICCA), 978-1-5386-2752-5/17, IEEE, 2017. [Google Scholar]
- H. Hacigumus, B. Iyer and S. Mehrotra, “Providing database as a service,” Proceedings 18th International Conference on Data Engineering, pp. 29–38, 2002. [CrossRef] [Google Scholar]
- Elisa Bertino, and Ravi Sandhu, “Database Security—Concepts, Approaches, and Challenges”, IEEE Transactions On Dependable And Secure Computing, VOL. 2, NO. 1, January-March 2005. [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.