2019
DOI: 10.1007/s11277-019-06867-0
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid RSAECC Based Secure Communication in Mobile Cloud Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…We implemented Whirlpool because (a) the anticipated capability of producing an impact was of the mandate of 2 x/2 performances of Whirlpool; (b) Specified an n-bit rate, the predictable capability of discovering a communicated/buffered data that jumbles to that value is of the mandate of 2 x performances of Whirlpool; and (c) assumed a communication and its n-bit hash outcome, the anticipated capacity of discovering a subsequent data that hashes to the identical value is of the order of 2 x implementations of Whirlpool. Figure 3 illustrates the proposed scheme that utilizes 'hybrid encryption (RSA-AES) [14] [24]. It integrates a blend of asymmetric and symmetric encoding/decoding to profit from the vitality of each arrangement of encryption.…”
Section: Node Security Using Blockchainmentioning
confidence: 99%
“…We implemented Whirlpool because (a) the anticipated capability of producing an impact was of the mandate of 2 x/2 performances of Whirlpool; (b) Specified an n-bit rate, the predictable capability of discovering a communicated/buffered data that jumbles to that value is of the mandate of 2 x performances of Whirlpool; and (c) assumed a communication and its n-bit hash outcome, the anticipated capacity of discovering a subsequent data that hashes to the identical value is of the order of 2 x implementations of Whirlpool. Figure 3 illustrates the proposed scheme that utilizes 'hybrid encryption (RSA-AES) [14] [24]. It integrates a blend of asymmetric and symmetric encoding/decoding to profit from the vitality of each arrangement of encryption.…”
Section: Node Security Using Blockchainmentioning
confidence: 99%
“…To evaluate the proposed method, the computation costs of RSA (Rivest-Shamir-Adleman) [1] and ECC (elliptic curves cryptography) [2] were compared in TABLE VII. In our experiments, the number of records is m. The computation costs of encryption and summation by these methods (i.e.…”
Section: Evaluation and Analysesmentioning
confidence: 99%
“…With the privacy application development of the Internet of things, more and more terminal devices access the Internet and transmit data via web services. However, massive calculations are needed by encryption and decryption for processing huge amounts of data, for instance, the time complexities of RSA (Rivest-Shamir-Adleman) [1] and ECC (elliptic curves cryptography) [2] for encryption and decryption are both O(m), where m is the number of records. Therefore, this study proposes a multiple linear regression system coupled with method based on stream homomorphic encryption computing.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The popular flexible model for IDS deployments in cloud environments is Infrastructure as Services (IaaS) according to cloud architecture. 15 For intrusion detection, the traditional network controls the traffic and detects attacks on the hypervisor and virtual machines. 16 The higher accurate IDSs are used to detect the larger volume of network data and new attack behaviors.…”
mentioning
confidence: 99%