Submit your articles to the African Journal of Biomedical Research, active in Scopus Q3 and Clarivate Web of Science Zoological Records. Click here to submit your manuscript.
Volume 7 (2020) | Issue 10
Volume 11 (2024) | Issue 5
Volume 11 (2024) | Issue 5
Volume 11 (2024) | Issue 5
Volume 11 (2024) | Issue 5
Cloud computing shares resources and services; adore dispersive data, code and hardware platforms, through net and virtualization technologies. Because of the difficult structure and co-share feature of cloud computing. Encryption and authentication are this key techniques for the protection of large knowledge throughout cloud computing. Encryption and decoding are unremarkably applied ways for knowledge security. Time has forever competed animperativetask in communication. Data will turn intoineffective once a finickyposition; sensitive knowledge might not be free before a particular time. Identity-based systems have a characteristic downside operating. This limitation could also be overcome by together with a time element within the identity. Through this manuscript, we have a tendency to novel cryptographic technique referred to as Time Stamp encryption (TSE) that addresses this downside. In our planned work introduce a brand new paradigm utilize time parameters that embody cryptography formula offers as high secured, powerful validation and scale back the time quality for encryption mechanism.