2018 International Conference on Computing, Power and Communication Technologies (GUCON) 2018
DOI: 10.1109/gucon.2018.8675031
|View full text |Cite
|
Sign up to set email alerts
|

Security of Multimedia in Cloud using Secret Shared Key

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…S. Choudhary et al[11] used the snort NIDS for the auto detection of SQL injection attacks and moloch approach to analyze the captured packets (pcap) for the prototype system. K. Sinha[12] et al proposed the secret shared key mythology to prevent from MITM attack during the transfer of multimedia data in cloud storage over the internet.…”
mentioning
confidence: 99%
“…S. Choudhary et al[11] used the snort NIDS for the auto detection of SQL injection attacks and moloch approach to analyze the captured packets (pcap) for the prototype system. K. Sinha[12] et al proposed the secret shared key mythology to prevent from MITM attack during the transfer of multimedia data in cloud storage over the internet.…”
mentioning
confidence: 99%