Enhancement of Cloud Security Using AES 512 Bits

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cloud Computing Security Enhancement by Using Mobile PIN Code

The proliferation of internet users is increasing rapidly as a result of network growth in technology (wired and wireless) in recent years, cloud computing services has gained attention in the scientific and industrial communities. Cloud computing provides a flexible and cost effective services for consumers and companies through offering services, resources and infrastructure for providers. Cl...

متن کامل

Using Kerberos with Digital Signature and AES Encryption to Provide Data Security in Cloud Computing

The Cloud Computing is the next generation platform that provides dynamic resources pools, virtualization, and high availableness. Today, with the assistance of those computing, we are able to utilize ascendable, distributed computing environments among the boundary of the web, It provides several edges in terms of low value and accessibility of information, conjointly offers associate degree i...

متن کامل

Security Enhancement in Next Generation Networks using Enhanced AES with RC4 and Dynamic S-box

---------------------------------------------------------------------***--------------------------------------------------------------------Abstract Encryption is primary method of protecting valuable electronic information transmitted over the networks. SSL/TLS can help to secure transmitted data using various encryption algorithms. AES is one of ciphering algorithm which is used for encryptio...

متن کامل

Unbelievable Security. Matching AES Security Using Public Key Systems

The Advanced Encryption Standard (AES) provides three levels of security: 128, 192, and 256 bits. Given a desired level of security for the AES, this paper discusses matching public key sizes for RSA and the ElGamal family of protocols. For the latter both traditional multiplicative groups of finite fields and elliptic curve groups are considered. The practicality of the resulting systems is co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Research Journal of Applied Sciences, Engineering and Technology

سال: 2014

ISSN: 2040-7459,2040-7467

DOI: 10.19026/rjaset.8.1206