Linked e-resources

Details

Preface; Organization; Contents; Security and Privacy in Cloud Computing: A Survey; 1 Introduction; 2 Challenges to Security and Privacy; 2.1 Privacy Issues; 2.2 Security Issues; 3 Existing Solutions and Open Issues to Security and Privacy; 3.1 Client Based Privacy Manager; 4 Open Research Problem; 5 Conclusion; References; Analysis of Secret Key Revealing Trojan Using Path Delay Analysis for Some Cryptocores; 1 Introduction; 2 Hardware Trojan Horses; 3 Cryptocores; 3.1 Advanced Encryption Standard (AES); 3.2 Data Encryption Standard (DES); 4 Design and Analysis of Trojan on Cryptocores

5 Implementation and Results6 Future Work; 7 Conclusion; References; Generating Digital Signature Using DNA Coding; 1 Introduction; 2 Related Work; 3 Proposed Work; 3.1 Digital Signature; 3.2 Sharing Symmetric Key Using Public Key Cryptography; Results; 5 Conclusion; References; DNA Encryption Based Dual Server Password Authentication; 1 Introduction; 2 Related Work; 3 Proposed System; 3.1 ElGamal Encryption/Decryption Algorithm [10]; 3.2 DNA Encryption/Decryption Algorithm; 4 Result Analysis; 4.1 Security against Brute-Force Attack; 5 Conclusion; References

Dynamic Cost-Aware Re-replication and Rebalancing Strategy in Cloud System1 Introduction; 2 Related Work; 3 System Model; 4 Dynamic Cost-Aware Re-replication and Rebalancing Strategy; 5 Simulation; 6 Conclusions and Future Scope; References; Signalling Cost Analysis of Community Model; 1 Introduction; 2 Related Work; 3 Signalling Cost Estimation of Community Model; 3.1 Mathematical Formulation for Signalling Cost; 3.2 Algorithm for Signalling Cost; 4 Performance Analysis; 5 Conclusion; References; Steganography with Cryptography in Android; 1 Introduction

1.1 Advanced Encryption Standards (AES)1.2 Ron Rivest, AdiShamir, Leonard Adleman (RSA):; 1.3 Steganography (LSB); 2 Problem Definition; 3 Related Work; 4 Proposed System Architecture; 4.1 Public Key and Private Key Generation and Transfer; 4.2 Encryption Phase; 4.3 Decryption Phase; 5 Future Scope; 6 Applications; 7 Conclusion; References; A Cloud Based Architecture of Existing e-District Project in India towards Cost Effective e-Governance Implementation; 1 Introduction; 2 Literature Review; 3 Methodology; 4 Reason to OPT IaaS in e-District Project

5 Existing e-District Project Delivery Model6 Proposed Cloud Based e-District Project Architecture; 7 Conclusion; References; A Chaotic Substitution Based Image Encryption Using APA-transformation; 1 Introduction; 2 Preliminaries; 2.1 Chaotic Logistic Map; 2.2 APA-transformation; 2.3 Keyed Latin Square; 2.4 Substitution Boxes; 3 Proposed Algorithm; 4 Simulation Results; 5 Conclusion; References; Security, Trust and Implementation Limitations of Prominent IoT Platforms; 1 Introduction; 2 IoT Middleware Platform / Framework Comparison; 3 Related Work; 4 IoT Middleware Platforms/Framework Used

Browse Subjects

Show more subjects...

Statistics

from
to
Export