quantum hash function
Recently Published Documents


TOTAL DOCUMENTS

6
(FIVE YEARS 2)

H-INDEX

3
(FIVE YEARS 0)

2020 ◽  
pp. 61-71
Author(s):  
K. Shankar ◽  

The security with the protection of IoT is to stay a consequential test, for the most part, because of the huge scale and dispersed nature of IoT systems. A cloud server brings wide pertinence of IoT in numerous businesses just as Government parts. Be that as it may, the security concerns, for example, verification and information protection of these gadgets assume a key job in fruitful coordination of two innovations. To build the security here, a quantum hash work system and hybrid cuckoo search-Artificial Bee Colony algorithm is displayed. A quantum hash work has been presented as an amazing system for secure correspondence of IoT and cloud because of its irregular disordered robust execution, greater affectability for introductory authority dimension, steadiness, and the exceptionally huge crucial area is hypothetically sufficiently able to oppose different known assaults. Cloud servers utilizing CS-ABC to upgrading the safe calculations through a quantum channel inside the cloud framework. Execution examinations and recreation outcomes demonstrate our presented methods are portrayed and also have greater safety, proficiency with strength opposed to a few surely understood assaults which choose them as a great contender for verifying cloud and IoT applications.


2019 ◽  
Vol 59 (2) ◽  
pp. 635-648
Author(s):  
Yalan Wang ◽  
Yuling Chen ◽  
Zhanhong Wei ◽  
Haseeb Ahmad

2018 ◽  
Vol 8 (1) ◽  
Author(s):  
Dan Li ◽  
Yu-Guang Yang ◽  
Jing-Lin Bi ◽  
Jia-Bin Yuan ◽  
Juan Xu

Sign in / Sign up

Export Citation Format

Share Document