Designed with ♥ at Skróts

Publication type: Journal Paper

17 Aug 2023

Outsourcing data to a third-party administrative control, as is done in cloud computing, gives rise to security concerns. The data compromise may occur due to attacks by other users and nodes within the cloud. Therefore, high security measures are required to protect data within the cloud. However, the employed security strategy must also take into […]

Comments Off on Securing Data Using Drops Methodology

Publication type: Journal Paper

Wireless ad hoc network system is a foundation less multi-hop system of versatile remote hubs with heterogamous assets. The attributes of WANETs are adjustment, self-shaping and shared systems administration. The transmission of data is happen legitimately if the conveying hubs present in the radio scope of each other generally the correspondence is hand-off on the […]

Comments Off on Analysis of Black Hole Attack in MANET Based on Simulation through NS2

Publication type: Journal Paper

17 Aug 2023

Searchable encryption is of increasing interest for protecting the data privacy in secure searchable cloud storage. In this paper, we investigate the security of a well-known cryptographic primitive, namely, public key encryption with keyword search (PEKS) which is very useful in many applications of cloud storage. Unfortunately, it has been shown that the traditional PEKS framework suffers […]

Comments Off on Multiple Server With Public Key Encryption

Publication type: Journal Paper

After the 2020 pandemic, everyone realized that the collaborations which were being done offline had to go online. This created a stir among the community as there was no legal bond between the two entities working together. Be it a large company working for another one or an individual working as a contractor. Smart contracts […]

Comments Off on Collaborations with Smart contracts using Blockchain