[1]
X. Li, K. Li, K. Li, and Y. Li, "An efficient and secure authentication scheme for cloud computing using smart cards", Future Gener. Comput. Syst., vol. 102, pp. 369-380, 2020.
[2]
Y. Zhang, S. Wang, R. Liu, and C. Yang, "A privacy-preserving three-factor authentication scheme for cloud-assisted cyber-physical systems", IEEE Internet Things J., vol. 8, no. 5, pp. 3355-3365, 2021.
[3]
D. Mishra, A. Kumar, and R. Kumar, "A secure authentication scheme for cloud computing based on three-factor and biometric authentication", Comput. Secur., vol. 92, 2020.101727
[4]
D. Zou, Y. Li, and C. Li, "A three-factor authenticated key exchange protocol for cloud computing based on elliptic curve cryptography", IEEE Access, vol. 7, pp. 151718-151727, 2019.
[5]
J. Li, L. Li, and Z. Li, "An efficient and secure three-factor remote user authentication scheme with key agreement for cloud computing", J. Supercomput., vol. 76, no. 1, pp. 522-539, 2020.
[6]
V. Chang, and M. Ramachandran, "DNA cryptography for cloud computing: A review", J. Ambient Intell. Humaniz. Comput., vol. 10, no. 10, pp. 3747-3759, 2019.
[7]
D. Singh, and V. Kumar, "A novel DNA-based cryptography for cloud data security", J. Inform. Sec. Appl., vol. 60, 2021.102748
[8]
H. Thapliyal, A. Agarwal, and N. Kumar, "Design of novel DNA cryptography algorithm based on mathematical operations for data security in cloud computing", J. Ambient Intell. Humaniz. Comput., vol. 11, no. 1, pp. 183-194, 2020.
[9]
A. Bhattacharyya, "A new DNA-based cryptography scheme for cloud data security", J. Inform. Sec. Appl., vol. 54, 2020.102566
[10]
T. Yousuf, N.R. Aljohani, A. Albeshri, and T. Kousiouris, "A comparative study of DNA cryptography algorithms for cloud data security", J. Ambient Intell. Humaniz. Comput., vol. 12, no. 2, pp. 1631-1641, 2021.
[11]
M. AlZain, M.S. Sohail, A. Alarifi, and F. Alfaresi, "Enhanced security framework for cloud storage based on DNA cryptography", IEEE Access, vol. 7, pp. 170974-170986, 2019.
[12]
X. Ding, Q. Wu, and H. Jin, "An efficient and secure DNA-based authentication scheme for cloud computing", IEEE Access, vol. 8, pp. 143455-143463, 2020.
[13]
A. Ghosh, and M. Chakraborty, "A novel DNA cryptography algorithm for secure data transmission in cloud computing", J. Ambient Intell. Humaniz. Comput., vol. 11, no. 4, pp. 1763-1774, 2020.
[14]
D. Jose Anand, R. Srinath, R. Janarthanan, and C.U. thayakumar, "Efficient security for desktop data grid using fault resilient content distribution", Int. J. Eng. Res. Indus. Appl., vol. 2, no. VII, pp. 301-313, 2009.
[15]
A.S. Akanbi, and A.M. Aliyu, "A DNA-based authentication scheme for cloud computing", Int. J. Eng. Res. Indus. Appl., vol. 54, 2020.102537
[16]
N. Kumar, H. Thapliyal, and A. Agarwal, "DNA cryptography-based data encryption in cloud computing", J. Ambient Intell. Humaniz. Comput., vol. 10, no. 7, pp. 2745-2754, 2019.
[17]
J. Anand, H. Gowtham, R. Lingeshwaran, J. Ajin, and J. Karthikeyan, "IoT based smart electrolytic bottle monitoring", Adv. Paral. Comp. Technol. Appl. IOS Press, vol. 40, pp. 391-399, 2021.
[19]
S. Shiju Rawther, "Entropy analysis of cyber attack propagation in network 2022 13th International Conference on Computing Communication
and Networking Technologies (ICCCNT),, 2022pp. 1-4
03-05 October 2022 , Kharagpur, India",
[20]
I. Alam, and S.N. Singh, Designing and implementing cloud security using multi- layer dna cryptography in python., Trend. Wirel. Commun. Inform. Secur, 2021, pp. 375-385.