Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"On the Significance of Cryptography as a Service"
written by Nick Rahimi, Jacob J. Reed, Bidyut Gupta,
published by Journal of Information Security, Vol.9 No.4, 2018
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] System Support for Environmentally Sustainable Computing in Data Centers
arXiv preprint arXiv:2403.12698, 2024
[2] Encryption as a Service: A Review of Architectures and Taxonomies
IFIP International Conference on …, 2024
[3] Improved Elliptic Curve Image Cryptography Using Genetic Algorithm based Key Selection for Securely Data Transmission
2023
[4] An Integrated Framework for Location Based Security in Cloud Environment using Multi Objective Optimization (ILBS-MOO)
2023 IEEE 3rd Mysore Sub Section International …, 2023
[5] GAHBT: Genetic Based Hashing Algorithm for Managing and Validating Health Data Integrity in Blockchain Technology
Blockchain in …, 2023
[6] Emergence of blockchain technology in the healthcare and insurance industries
2023
[7] Encryption as a Service for IoT: Opportunities, Challenges and Solutions
IEEE Internet of …, 2023
[8] GAHBT: Genetic-Based Hashing Algorithm for Managing and Validating Health Data Integrity in Blockchain Technology
Blockchain in Healthcare …, 2023
[9] Research on Cryptography as a Service Technique Based on Commercial Cryptography
2022 IEEE 2nd International …, 2022
[10] Design and Implementation of a Dockerized, Cross Platform, Multi-Purpose Cryptography as a Service Framework Featuring Scalability, Extendibility and Ease of …
2022 20th International …, 2022
[11] Blockchain Technology and Its Emerging Applications
2021
[12] Security Issues, Vulnerabilities, and Defense Mechanisms in Wireless Sensor Networks: State of the Art and Recommendation
2021
[13] A Study of the Landscape of Security Issues, Vulnerabilities, and Defense Mechanisms in Web Based Applications
2021 International Conference on Computational …, 2021
[14] Adversarial Machine Learning: Difficulties in Applying Machine Learning to Existing Cybersecurity Systems.
2020
[15] Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
2020
[16] SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
2020
[17] A Study of the Landscape of Internet Censorship and Anti-Censorship in Middle East.
2020
[18] Android Security and Its Rooting—A Possible Improvement of Its Security Architecture
2019
Free SCIRP Newsletters
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top