An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment
Cloud computing requires the security upgrade in data transmission approaches. In general, key-based encryption/decryption (symmetric and asymmetric) mechanisms ensure the secure data transfer between the devices. The symmetric key mechanisms (pseudorandom function) provide minimum protection level...
Saved in:
Main Authors: | Vinothkumar Muthurajan, Balaji Narayanasamy |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2016-01-01
|
Series: | The Scientific World Journal |
Online Access: | http://dx.doi.org/10.1155/2016/4913015 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Research on cloud dynamic public key information security based on elliptic curve and primitive Pythagoras
by: Zhenlong Man, et al.
Published: (2025-02-01) -
An Integrated Image Encryption Scheme Based on Elliptic Curve
by: Ijaz Khalid, et al.
Published: (2023-01-01) -
On the Search for Supersingular Elliptic Curves and Their Applications
by: Ismel Martinez-Diaz, et al.
Published: (2025-01-01) -
An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment
by: Sudha Devi Dorairaj, et al.
Published: (2015-01-01) -
A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment
by: Sanchika Gupta, et al.
Published: (2013-03-01)