Articles with "using phony" as a keyword



Photo by lukaszlada from unsplash

A Novel Encryption Algorithm for Securing Files in the Cloud using Phony Documents

Sign Up to like & get
recommendations!
Published in 2019 at "International Journal of Electrical and Computer Engineering"

DOI: 10.11591/ijece.v9i3.pp%p

Abstract: Organizations have chosen to leverage cloud services due to their simplicity and cost-effectiveness, however, the challenge of securing documents from malicious threats and persistent data breach have driven an increasing use of cryptographic techniques for… read more here.

Keywords: phony documents; novel encryption; cloud using; using phony ... See more keywords