2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT) 2022
DOI: 10.1109/icssit53264.2022.9716429
|View full text |Cite
|
Sign up to set email alerts
|

Crypto-Deep Reinforcement Learning Based Cloud Security For Trusted Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…In this, each message block is shifting the maximum column and encrypts with the key. The round key stores on the cloud server signature database to authenticate the original request user [33,34].…”
Section: Implementation Of the Proposed Methodsmentioning
confidence: 99%
“…In this, each message block is shifting the maximum column and encrypts with the key. The round key stores on the cloud server signature database to authenticate the original request user [33,34].…”
Section: Implementation Of the Proposed Methodsmentioning
confidence: 99%