Artykuły w czasopismach na temat „Cryptographic cloud architecture”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Cryptographic cloud architecture”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
TN, Nikhil. "Exploring on Cloud Security Landscapes:A Comprehensive Review." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34217.
Pełny tekst źródłaDr., R. Sridevi*1 &. C. B. Banupriya2. "A SURVEY ON CRYPTOGRAPHIC CLOUD STORAGE TECHNIQUES." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 7 (2017): 602–5. https://doi.org/10.5281/zenodo.829787.
Pełny tekst źródłaKaranam, Madhavi, Sahithi Reddy S, Abhinav Chakilam, and Srinu Banothu. "Performance Evaluation of Cryptographic Security Algorithms on Cloud." E3S Web of Conferences 391 (2023): 01015. http://dx.doi.org/10.1051/e3sconf/202339101015.
Pełny tekst źródłaThakur, Gaurav. "Enhancing Secure Cloud Storage: A Four-Tier Architecture with ChaCha20 Encryption, Blake3 Hashing, and Dynamic Chunk Allocation in Multi-Cloud Environment." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 497–507. https://doi.org/10.22214/ijraset.2025.70183.
Pełny tekst źródłaHathout, Basma Badawi, Samy Ghoniemy, and Osman Ibrahim. "A Modified Cloud-Based Cryptographic Agent for Cloud Data Integrity." International Journal of Interactive Mobile Technologies (iJIM) 11, no. 2 (2017): 6. http://dx.doi.org/10.3991/ijim.v11i2.6553.
Pełny tekst źródłaAiello, Samuel. "How Cryptography Can Augment Zero Trust." International Journal of Blockchain Technologies and Applications 1, no. 1 (2023): 52–60. http://dx.doi.org/10.18178/ijbta.2023.1.1.52-60.
Pełny tekst źródłaBhuite, Prof S. S. "A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47316.
Pełny tekst źródłaAbhale, Babasaheb Annasaheb, and Rohita Yamaganti Dr. "Mitigating cybersecurity risks in cloud computing through cryptographic protocols and service architecture." International Journal of Trends in Emerging Research and Development 2, no. 6 (2024): 153–59. https://doi.org/10.5281/zenodo.15239402.
Pełny tekst źródłaChen, Yilin. "Comparative Analysis of the Centralized and Decentralized Architecture of Cloud Computing in terms of Privacy Security." Applied and Computational Engineering 145, no. 1 (2025): 51–56. https://doi.org/10.54254/2755-2721/2025.21867.
Pełny tekst źródłaFairosebanu, Abdul Azis, and Antony Cruz Nisha Jebaseeli. "Data security in cloud environment using cryptographic mechanism." Bulletin of Electrical Engineering and Informatics 12, no. 1 (2023): 462–71. http://dx.doi.org/10.11591/eei.v12i1.4590.
Pełny tekst źródłaGaurav, Raj1 and Kamaljit Kaur2. "Secure Cloud Communication for Effective Cost Management System through MSBE." International Journal on Cloud Computing: Services and Architecture(IJCCSA) 2, June (2018): 01–12. https://doi.org/10.5281/zenodo.1440834.
Pełny tekst źródłaBadr, Aymen Mudheher, Yi Zhang, and Hafiz Gulfam Ahmad Umar. "Dual Authentication-Based Encryption with a Delegation System to Protect Medical Data in Cloud Computing." Electronics 8, no. 2 (2019): 171. http://dx.doi.org/10.3390/electronics8020171.
Pełny tekst źródłaMohammad Asad Hussain. "Blockchain for secure data integration in multi-cloud and hybrid cloud systems." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 743–53. https://doi.org/10.30574/wjarr.2025.26.2.1658.
Pełny tekst źródłaArunkumar, R. Josephius, and R. Anbuselvi. "An Enhanced Methodology to Protect the Patient Healthcare Records Using Multi-Cloud Approach." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (2017): 239. http://dx.doi.org/10.23956/ijarcsse.v7i8.57.
Pełny tekst źródłaLin, Han-Yu, and Yan-Ru Jiang. "A Multi-User Ciphertext Policy Attribute-Based Encryption Scheme with Keyword Search for Medical Cloud System." Applied Sciences 11, no. 1 (2020): 63. http://dx.doi.org/10.3390/app11010063.
Pełny tekst źródłaMuneera, M. Nafees, G. Anbu Selvi, V. Vaissnave, and Gopal Lal Rajora. "A Cryptographic based I2ADO-DNN Security Framework for Intrusion Detection in Cloud Systems." International Journal of Computer Network and Information Security 15, no. 6 (2023): 40–51. http://dx.doi.org/10.5815/ijcnis.2023.06.04.
Pełny tekst źródłaShamshad, Shuhab, Farina Riaz, Rabia Riaz, Sanam Shahla Rizvi, and Shahab Abdulla. "An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy." Sensors 22, no. 21 (2022): 8151. http://dx.doi.org/10.3390/s22218151.
Pełny tekst źródłaNeethu V A. "Enhancing Data Privacy and Integrity in Cloud Systems Through Blockchain and Quantum Cryptographic Integration." Journal of Information Systems Engineering and Management 10, no. 16s (2025): 327–37. https://doi.org/10.52783/jisem.v10i16s.2599.
Pełny tekst źródłaNeethu V A, Arun Vaishnav, Mohammad Akram Khan. "Enhancing Data Privacy and Integrity in Cloud Systems Through Blockchain and Quantum Cryptographic Integration." Journal of Information Systems Engineering and Management 10, no. 16s (2025): 52–62. https://doi.org/10.52783/jisem.v10i16s.2559.
Pełny tekst źródłaVani, K. H., and Dr P. Balamurugan. "Comparative Analysis of Trust-Based Data Storage Management Techniques in Dynamic Cloud Service." International Journal of Basic and Applied Sciences 14, no. 3 (2025): 258–65. https://doi.org/10.14419/vbn70d23.
Pełny tekst źródłaVijai, Anand Ramar, and Kumar R. Veerandra. "ENHANCING DATA PRIVACY AND SECURITY IN CLOUD HEALTHCARE SOLUTIONS USING ELLIPTIC CURVE CRYPTOGRAPHY (ECC)." International Journal Of Engineering Technology Research & Management (IJETRM) 03, no. 05 (2019): 133–43. https://doi.org/10.5281/zenodo.15600580.
Pełny tekst źródłaprasanna,, G. Laxmi. "PRIVACY PRESERVING DATA SHARING CLOUD-BASED HEALTHCARE SYSTEMS." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem40474.
Pełny tekst źródłaV Uday Kumar and Kaila Shahu Chatrapati. "Hybrid Hash Trees in Blockchain: Evaluating Algorithm Combinations for Speed and Security." International Journal of Scientific Research in Science, Engineering and Technology 12, no. 3 (2025): 1356–66. https://doi.org/10.32628/ijsrset2512181.
Pełny tekst źródłaGouru, Navya, and NagaLakshmi Vadlamani. "DistProv-Data Provenance in Distributed Cloud for Secure Transfer of Digital Assets with Ethereum Blockchain using ZKP." International Journal of Open Source Software and Processes 10, no. 3 (2019): 1–18. http://dx.doi.org/10.4018/ijossp.2019070101.
Pełny tekst źródłaYakoob, S. K., and V. Krishna Reddy. "Efficient Identity-Based Multi-Cloud Security Access Control in Distributed Environments." International Journal of e-Collaboration 19, no. 3 (2023): 1–13. http://dx.doi.org/10.4018/ijec.316771.
Pełny tekst źródłaMuddumadappa, Parashiva Murthy Basavanapura, Sumithra Devi Kengeri Anjanappa, and Mallikarjunaswamy Srikantaswamy. "An Efficient Reconfigurable Cryptographic Model for Dynamic and Secure Unstructured Data Sharing in Multi-Cloud Storage Server." Journal of Intelligent Systems and Control 1, no. 1 (2022): 68–78. http://dx.doi.org/10.56578/jisc010107.
Pełny tekst źródłaQiao, Huidong, Haihe Ba, Huaizhe Zhou, Zhiying Wang, Jiangchun Ren, and Ying Hu. "Practical, Provably Secure, and Black-Box Traceable CP-ABE for Cryptographic Cloud Storage." Symmetry 10, no. 10 (2018): 482. http://dx.doi.org/10.3390/sym10100482.
Pełny tekst źródłaChhaybi, Akram, and Saiida Lazaar. "Definition of a lightweight cryptographic solution to secure health data on IoT and cloud." General Letters in Mathematics 10, no. 2 (2021): 54–60. http://dx.doi.org/10.31559/glm2021.10.2.6.
Pełny tekst źródłaMr G shekar, Asthami Sai Kiran, Muthe Harish, and Padala Sai Rahul. "Multi tenancy cloud data with a shared privacy preserving trusted keyword search." International Journal of Information Technology and Computer Engineering 13, no. 2 (2025): 1290–95. https://doi.org/10.62647/ijitce2025v13i2pp1290-1295.
Pełny tekst źródłaChaudhari, Prithvi, Ji-Jian Chin, and Soeheila Moesfa Mohamad. "An In-Depth Analysis on Efficiency and Vulnerabilities on a Cloud-Based Searchable Symmetric Encryption Solution." Journal of Informatics and Web Engineering 3, no. 1 (2024): 265–76. http://dx.doi.org/10.33093/jiwe.2024.3.1.19.
Pełny tekst źródłaMarwan, Mbarek, Abdelkarim Ait Temghart, Fatima Sifou, and Feda AlShahwan. "A Cloud Solution for Securing Medical Image Storage." Journal of information and organizational sciences 44, no. 1 (2020): 113–39. http://dx.doi.org/10.31341/jios.44.1.5.
Pełny tekst źródłaKrishnan, Ponnarasan. "IoT - Enabled Secure and Scalable Cloud Architecture for Multi - User Systems: A Hybrid Post - Quantum Cryptographic and Block Chain based Approach Towards a Trustworthy Cloud Computing." International Journal of Science and Research (IJSR) 13, no. 9 (2024): 1349–63. http://dx.doi.org/10.21275/sr24922232225.
Pełny tekst źródłaRehman, Saba, Nida Talat Bajwa, Munam Ali Shah, Ahmad O. Aseeri, and Adeel Anjum. "Hybrid AES-ECC Model for the Security of Data over Cloud Storage." Electronics 10, no. 21 (2021): 2673. http://dx.doi.org/10.3390/electronics10212673.
Pełny tekst źródłaWang, Xu An, Jianfeng Ma, Fatos Xhafa, Mingwu Zhang, and Xiaoshuang Luo. "Cost-effective secure E-health cloud system using identity based cryptographic techniques." Future Generation Computer Systems 67 (February 2017): 242–54. http://dx.doi.org/10.1016/j.future.2016.08.008.
Pełny tekst źródłaBerlato, Stefano, Roberto Carbone, Adam J. Lee, and Silvio Ranise. "Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud." ACM Transactions on Privacy and Security 25, no. 1 (2022): 1–37. http://dx.doi.org/10.1145/3474056.
Pełny tekst źródłaSanthosh Kumar, P., and Latha Parthiban. "Scalable Anomaly Detection for Large-Scale Heterogeneous Data in Cloud Using Optimal Elliptic Curve Cryptography and Gaussian Kernel Fuzzy C-Means Clustering." Journal of Circuits, Systems and Computers 29, no. 05 (2019): 2050074. http://dx.doi.org/10.1142/s0218126620500747.
Pełny tekst źródłaGoyal, Mani, and Avinash Sharma. "A Framework for Assessing Security Strength of Cloud Computing Service." Journal of Computational and Theoretical Nanoscience 16, no. 10 (2019): 4389–93. http://dx.doi.org/10.1166/jctn.2019.8530.
Pełny tekst źródłaChen, Guo You, Jia Jia Miao, Feng Xie, and Han Dong Mao. "A Framework for Storage Security in Cloud Computing." Applied Mechanics and Materials 278-280 (January 2013): 1767–70. http://dx.doi.org/10.4028/www.scientific.net/amm.278-280.1767.
Pełny tekst źródłaAdeoye, Seun, and Russel Adams. "IoT-Enabled Secure and Scalable Cloud Architecture for Multi-User Systems: A Hybrid Post-Quantum Cryptographic and Block Chain-Based Approach towards a Trustworthy Cloud Computing." Cognizance Journal of Multidisciplinary Studies 4, no. 10 (2024): 183–209. http://dx.doi.org/10.47760/cognizance.2024.v04i10.013.
Pełny tekst źródłaSeun, Adeoye, and Adams Russel. "IoT-Enabled Secure and Scalable Cloud Architecture for Multi-User Systems: A Hybrid Post-Quantum Cryptographic and Block Chain-Based Approach towards a Trustworthy Cloud Computing." Cognizance Journal of Multidisciplinary Studies (CJMS) 4, no. 10 (2024): 183–209. https://doi.org/10.47760/cognizance.2024.v04i10.013.
Pełny tekst źródłaGaud, Prof V. Y. "SeGShare: Secure Group File Sharing in the Cloud using Enclaves." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 1047–52. https://doi.org/10.22214/ijraset.2025.70327.
Pełny tekst źródłaKanimetta, Dileep Kumar. "Modernizing Financial Messaging Systems: A Technical Review of SWIFT Infrastructure Deployment on Microsoft Azure." International Journal of Computing and Engineering 7, no. 10 (2025): 17–29. https://doi.org/10.47941/ijce.2957.
Pełny tekst źródłaNaregal, Keerti, and Vijay Kalman. "CP-ABE Unveiled: A Path to Fine-Tuned Cloud Data Security." Journal of Cyber Security, Privacy Issues and Challenges 2, no. 2 (2023): 20–25. http://dx.doi.org/10.46610/jcspic.2023.v02i02.004.
Pełny tekst źródłaČuřík, Peter, Roderik Ploszek, and Pavol Zajac. "Practical Use of Secret Sharing for Enhancing Privacy in Clouds." Electronics 11, no. 17 (2022): 2758. http://dx.doi.org/10.3390/electronics11172758.
Pełny tekst źródłaAmit Kumar. "AI and edge computing: Real-time collaboration in distributed systems." World Journal of Advanced Engineering Technology and Sciences 15, no. 1 (2025): 1037–43. https://doi.org/10.30574/wjaets.2025.15.1.0214.
Pełny tekst źródłaNagaraj M Lutimath, Maria Navin J. R. ,. "An Enhanced AES-ECC model with Key Dependent Dynamic S-Box for the Security of Mobile Applications using Cloud Computing." Journal of Electrical Systems 20, no. 2 (2024): 2735–46. http://dx.doi.org/10.52783/jes.2050.
Pełny tekst źródłaAlharbi, Saud, Wasan Awad, and David Bell. "HECS4MQTT: A Multi-Layer Security Framework for Lightweight and Robust Encryption in Healthcare IoT Communications." Future Internet 17, no. 7 (2025): 298. https://doi.org/10.3390/fi17070298.
Pełny tekst źródłaAnkit Gupta. "Blockchain-Based Tokenized Storage Incentives: Revolutionizing Decentralized Object Storage." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 854–64. https://doi.org/10.32628/cseit25111289.
Pełny tekst źródłaCharan Shankar Kummarapurugu. "AI-augmented blockchain for cloud data integrity assurance: Building trustworthy, tamper-proof data systems in distributed clouds." International Journal of Science and Research Archive 3, no. 1 (2021): 163–70. http://dx.doi.org/10.30574/ijsra.2021.3.1.0103.
Pełny tekst źródłaYousuf, Omerah, and Roohie Naaz Mir. "A survey on the Internet of Things security." Information & Computer Security 27, no. 2 (2019): 292–323. http://dx.doi.org/10.1108/ics-07-2018-0084.
Pełny tekst źródła