Cloud Data Security through BB84 Protocol and Genetic Algorithm

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authen...

Full description

Saved in:
Bibliographic Details
Main Authors: Jaydip Kumar, Vipin Saxena
Format: Article
Language:English
Published: University of Baghdad, College of Science for Women 2022-12-01
Series:مجلة بغداد للعلوم
Subjects:
Online Access:https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/7281
Tags: Add Tag
No Tags, Be the first to tag this record!