Search
Now showing items 21-22 of 22
On Theory and Applications of Mathematics to Security in Cloud Computing: A Case of Addition-Composition Fully Homomorphic Encryption Scheme
(International Journal of Academic Studies, 2016-04-12)
Addition-Composition Fully Homomorphic Encryption is given inthis paper to solve data security equation in cloud computation. An earlierattempt to solve security problem has been proposed by Craig Gentry,who combined ...
Machine Learning Protocol for Secure 5G Handovers
(JOOUST, 2022-01-27)
The fifth generation (5G) networks are characterized with ultra-dense deployment of base stations with limited footprint. Consequently, user equipment’s handover frequently as they move within 5G networks. In addition, 5G ...