Open Access
Issue |
E3S Web Conf.
Volume 556, 2024
International Conference on Recent Advances in Waste Minimization & Utilization-2024 (RAWMU-2024)
|
|
---|---|---|
Article Number | 01002 | |
Number of page(s) | 5 | |
DOI | https://doi.org/10.1051/e3sconf/202455601002 | |
Published online | 09 August 2024 |
- D. Ulybyshev et al., "Privacy-Preserving Data Dissemination in Untrusted Cloud," 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), Honololu, HI, USA, 2017, pp. 770–773, doi: 10.1109/CLOUD.2017.111. [CrossRef] [Google Scholar]
- H. Guesmi and L. A. Saïdane, "Improved Data Storage Confidentiality in Cloud Computing Using Identity-Based Cryptography," 2017 25th International Conference on Systems Engineering (ICSEng), Las Vegas, NV, USA, 2017, pp. 324–330, doi: 10.1109/ICSEng.2017.32. [CrossRef] [Google Scholar]
- P. Sreekumari, "Privacy-Preserving Keyword Search Schemes over Encrypted Cloud Data: An Extensive Analysis," 2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS), Omaha, NE, USA, 2018, pp. 114–120, doi: 10.1109/BDS/HPSC/IDS18.2018.00035. [Google Scholar]
- C. Sahin and A. El Abbadi, "Data Security and Privacy for Outsourced Data in the Cloud," 2018 IEEE 34th International Conference on Data Engineering (ICDE), Paris, France, 2018, pp. 1731–1734, doi: 10.1109/ICDE.2018.00225. [CrossRef] [Google Scholar]
- S. Lei, W. Zewu, Z. Kun, S. Ruichen and L. Shuai, "Research and design of cryptography cloud framework," 2018 IEEE 3rd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), Chengdu, China, 2018, pp. 147–154, doi: 10.1109/ICCCBDA.2018.8386503. [Google Scholar]
- Mamta, M. D. Khare and C. S. Yadav, "Secure data transmission in cloud environment using visual cryptography and genetic algorithm: A review," 2017 International Conference on Innovations in Control, Communication and Information Systems (ICICCI), Greater Noida, India, 2017, pp. 1–4, doi: 10.1109/ICICCIS.2017.8660941. [Google Scholar]
- J. Shen, T. Zhou, D. He, Y. Zhang, X. Sun and Y. Xiang, "Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing," in IEEE Transactions on Dependable and Secure Computing, vol. 16, no. 6, pp. 996–1010, 1 Nov.-Dec. 2019, doi: 10.1109/TDSC.2017.2725953. [CrossRef] [Google Scholar]
- A. Kumar, V. Jain and A. Yadav, "A New Approach for Security in Cloud Data Storage for IOT Applications Using Hybrid Cryptography Technique," 2020 International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC), Mathura, India, 2020, pp. 514–517, doi: 10.1109/PARC49193.2020.236666. [Google Scholar]
- A. Kumar, "Framework for Data Security Using DNA Cryptography and HMAC Technique in Cloud Computing," 2021 Second International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, 2021, pp. 898–903, doi: 10.1109/ICESC51422.2021.9532950. [CrossRef] [Google Scholar]
- A. Kumar, "Data Security and Privacy using DNA Cryptography and AES Method in Cloud Computing," 2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 2021, pp. 1529–1535, doi: 10.1109/I-SMAC52330.2021.9640708. [CrossRef] [Google Scholar]
- R. S. Shukla, "IoT Based Designing of Secure Data Storage System in Distributed Cloud System with Big Data using Cryptography Algorithm," 2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART), Moradabad, India, 2022, pp. 264–270, doi: 10.1109/SMART55829.2022.10047177. [CrossRef] [Google Scholar]
- M. Kaur, A. B. Kaimal, J. K. Sandhu and R. Sahu, "Cloud Data Security using Hybrid Algorithm," 2023 3rd International Conference on Smart Data Intelligence (ICSMDI), Trichy, India, 2023, pp. 223–228, doi: 10.1109/ICSMDI57622.2023.00049. [Google Scholar]
- I. Sudha, C. Donald, S. Navya, G. Nithya, M. Balamurugan and S. Saravanan, "A Secure Data Encryption Mechanism in Cloud Using Elliptic Curve Cryptography," 2024 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE), Bangalore, India, 2024, pp. 1–5, doi: 10.1109/IITCEE59897.2024.10467407. [Google Scholar]
- K. Gulati, R. S. Kumar Boddu, D. Kapila, S. L. Bangare, N. Chandnani, and G. Saravanan, "A review paper on wireless sensor network techniques in Internet of Things (IoT)," 2021, vol. 51: Elsevier Ltd, pp. 161–165, doi: 10.1016/j.matpr.2021.05.067. [Online]. Available: https://www.scopus.com/inward/record.uri?eid=2-s2.0-85112813731&doi=10.1016%2fj.matpr.2021.05.067&partnerID=40&md5=cdfd8aefa3368d90534d939a7354b5d8 [Google Scholar]
- M. Nagaraju and P. Chawla, "Systematic review of deep learning techniques in plant disease detection," International Journal of System Assurance Engineering and Management, Article vol. 11, no. 3, pp. 547–560, 2020, doi: 10.1007/s13198-020-00972-1. [Google Scholar]
- G. R. Singh, M. K. Gupta, M. Mia, and V. S. Sharma, "Modeling and optimization of tool wear in MQL-assisted milling of Inconel 718 superalloy using evolutionary techniques," International Journal of Advanced Manufacturing Technology, Article vol. 97, no. 1-4, pp. 481–494, 2018, doi: 10.1007/s00170-018-1911-3. [CrossRef] [Google Scholar]
- S. Singh et al., "Nitrates in the environment: A critical review of their distribution, sensing techniques, ecological effects and remediation," Chemosphere, Review vol. 287, 2022, Art no. 131996, doi: 10.1016/j.chemosphere.2021.131996. [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.