2016 IEEE 7th Annual Ubiquitous Computing, Electronics &Amp; Mobile Communication Conference (UEMCON) 2016
DOI: 10.1109/uemcon.2016.7777905
|View full text |Cite
|
Sign up to set email alerts
|

Secuirity in cloud storage: An enhanced technique of data storage in cloud using RNS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…Let's consider examples of the implementation of each of the abovementioned reverse transformation methods. Let's take the system of modules with minimal values p i = [3,5,7,11], n=4.…”
mentioning
confidence: 99%
“…Let's consider examples of the implementation of each of the abovementioned reverse transformation methods. Let's take the system of modules with minimal values p i = [3,5,7,11], n=4.…”
mentioning
confidence: 99%