A platform for research: civil engineering, architecture and urbanism
Authentication and encryption in Cloud Computing
Cloud Computing is becoming increasingly popular day by day. If the security parameters are taken care properly many enterprises and government agencies will move into cloud environment. In this paper, we take a holistic view of cloud computing through authentication and encrytion. An authentication method is proposed at a lower level which can be implemented by cloud providers. It is a simple way of autentication which can be utilized by devolpers alongwith encryption.
Authentication and encryption in Cloud Computing
Cloud Computing is becoming increasingly popular day by day. If the security parameters are taken care properly many enterprises and government agencies will move into cloud environment. In this paper, we take a holistic view of cloud computing through authentication and encrytion. An authentication method is proposed at a lower level which can be implemented by cloud providers. It is a simple way of autentication which can be utilized by devolpers alongwith encryption.
Authentication and encryption in Cloud Computing
Singh, Jatinder Paul (author) / Mamta, (author) / Kumar, Sunil (author)
2015-05-01
259677 byte
Conference paper
Electronic Resource
English
Intelligent door lock with encryption authentication function
European Patent Office | 2023
|SAKAP: SGX-Based Authentication Key Agreement Protocol in IoT-Enabled Cloud Computing
DOAJ | 2022
|Electric power intelligent lock device based on ESAM encryption authentication
European Patent Office | 2020
|Communications & Technology Authentication vs. encryption: How secure is your control network?
British Library Online Contents | 2004