1.
Selvi, S., and M. Gobi. "Hyper Elliptic Curve Based Homomorphic Encryption Scheme for Cloud Data Security." International Conference on Intelligent Data Communication Technologies and Internet of Things. Springer, Cham, 2018.
2.
Gobi, M., and R. Sridevi. "An Approach for Secure Data Storage in Cloud Environment." International Journal of Computer and Communication Engineering 2.2 (2013): 206.
3.
Fu X, Liu B, Xie Y, Li W, Liu Y. (2018) ‘Image Encryption-Then-Transmission Using DNA Encryption Algorithm and The Double Chaos’, IEEE Photonics Journal. Vol.10 NO.3, pp.1-15
4.
Selvi, S., and M. Gobi. "An Efficient Data Security Model using Hyper Elliptic Curve Cryptography and Steganography
5.
Liu X, Deng R. H, Choo K. -K. R, Yang Y, and Pang H. (2020) ‘Privacy-Preserving Outsourced Calculation Toolkit in the Cloud’, IEEE Transactions on Dependable and Secure Computing,vol. 17 NO.5, pp.898-911
6.
Wei X, Guo L, and Zhang Q.(2012), ‘A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system’, J. Syst. Softw. Vol.85 NO.2, pp.290-299
7.
Q. Alam S. U. R. Malik A. Akhunzada K. R. Choo S. Tabbasum and M. Alam,(2017) ’ A cross tenant access control (CTAC) model for cloud computing: Formal specification and verification’, IEEE Trans. Inf. Forensics Secur, vol.12 NO. 6 pp.1259-1268
8.
Gobi, M., R. Sridevi, and R. Rahini. "A comparative study on the performance and the security of RSA and ECC algorithm." International journal of advanced network and application (2015)
9.
Sridevi, R., and S. Selvi. "Progressing Biometric Security Concern with Blowfish Algorithm.", International Journal of Innovative Technology and Exploring Engineering (IJITEE), Volume-8, Issue- 9S2, 2019.
10.
Kumar B. M, Sri B. R. S, Katamaraju, G. M. S. A, Rani P, Harinadh N, and Saibabu C. (2020) ‘File Encryption and Decryption Using DNA Technology’, 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), pp.382-385
11.
Kumar, G. Kishore, and Dr M. Gobi. "Role of Cryptography & its Related Techniques in Cloud Computing Security." International Journal for Research in Applied Science and Engineering Technology, IJRASET 5 (2017).
12.
Selvi, S., et al. "Hyper elliptic curve cryptography in multi cloud-security using DNA (genetic) techniques." 2017 International Conference on Computing Methodologies and Communication (ICCMC). IEEE, 2017
13.
Pushpa B. R. (2017) ‘A new technique for data encryption using DNA sequence’, 2017 International Conference on Intelligent Computing and Control(I2C2), pp.1-4
14.
Ritu Gupta and Anchal Jain. (2014) ‘A New Image Encryption Algorithm based on DNA Approach’, International Journal of Computer Applications, Vol. 85 NO. 18
15.
Selvi, S., and R. Sridevi. "Efficient Scheduling Mechanisms for Secured Cloud Data Environment.", International Journal of Recent Technology and Engineering (IJRTE), Volume-8, Issue-2S11, 2019.
16.
Seyedali Mirjalili, Seyed Mohammad Mirjalili and Andrew Lewisa, (2014) ‘Grey Wolf Optimizer, Advances in Engineering Software, Vol.69, pp.46-61
17.
Abhishek Majumdar, Arpita Biswas, Atanu Majumder, Sandeep Kumar Sood and Krishna Lal Baishnab, (2020) ‘A novel DNA-inspired encryption strategy for concealing cloud storage’, Frontiers of Computer Science,Vol. 15
18.
Ahmed Elhadad . (2019) ‘ Data sharing using proxy re-encryption based on DNA computing’, Soft Computing,vol.24, pp. 2101–2108
19.
Thangavel,M Varalakshmi,,P. (2017) ‘Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud’, Cluster Computing, vol.21, pp.1411–1437
20.
Nithya Chidambaram, Pethuru Raj Thenmozhi,k Sundararaman Rajagopalan, Rengarajan Amirtharajan,(2019) ‘ A cloud compatible DNA coded security solution for multimedia file sharing & storage’, Multimedia Tools and Applications,vol.78, pp.33837–33863
21.
Sandhia,G.K. Raja, S. V. K. (2021) ‘Secure sharing of data in cloud using MA-CPABE with elliptic curve cryptography’, Journal of Ambient Intelligence and Humanized Computing
22.
Muhammad Tahir, Muhammad Sardaraz, Zahid Mehmood and Shakoor Muhammad, (2020) CryptoGA: a cryptosystem based on genetic algorithm for cloud data security. Cluster Computing. Vol. 24, pp. 739–752
23.
Rashmi Ramesh Rachh, Ananda Mohan P.V,and Anami B.S. (2012) ‘Efficient Implementations for AES Encryption and Decryption. Circuits, Systems, and Signal Processing’, Vol.31, pp.1765-1785
24.
Ch. Usha Kumari, T. Pavani, A. Sampath Dakshina Murthy, B. Lakshmi Prasanna, and M. Pala Prasad Reddy, "Generating Cipher Text using BLOWFISH Algorithm for Secured Data Communications", International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol. 9, No. 2, December 2019
25.
Indumathi Saikumar, (2017) ‘DES- Data Encryption Standard’, International Research Journal of Engineering and Technology,Vol. 4 NO.3,
26.
Khan J.S. (2020) et al., ‘DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption’, IEEE Access. Vol.8, pp.159732-159744.