Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Securing data is a challenging issue in the present time. Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to the important information. Cryptography protects users by providing... more
    • by 
    •   7  
      Data CompressionData compression and Information TheoryData Compression algorithms.Encryption Techniques
    • by 
    •   4  
      EncryptionCyber SecurityEncryption TechniquesEncryption Algorithms
    • by 
    •   8  
      Network SecurityComputer SecurityAESEncryption Techniques
    • by 
    •   5  
      Computer ScienceComputer EngineeringLinear ProgrammingCloud Computing
Data de-duplication is an emerging technology, which incurs a benefit of storing a single instance or a single copy of duplicated data in a storage disk. As the number of user increase in the network there will be an explosive growth in... more
    • by  and +1
    • Encryption Techniques
    • by 
    •   7  
      Wireless CommunicationsWireless Sensor NetworksComputer SecurityCryptography
Cloud computing provides many benefits to the users such as accessibility and availability. As the data is available over the cloud, it can be accessed by different users. There may be sensitive data of organization. This is the one issue... more
    • by 
    •   6  
      Network SecurityCloud ComputingIntrusion DetectionCloud Computing Security
    • by 
    •   20  
      Computer ScienceDistributed ComputingEncryptionElliptic curve cryptography for encryption and digital signature
    • by 
    •   20  
      Distributed ComputingEncryptionElliptic curve cryptography for encryption and digital signatureComputer Software
Cloud computing has good services like virtualization. Virtualization provides the unlimited computational resources. Cloud computing provides robust design with low cost. Different security constraints are satisfied in outsourcing with... more
    • by 
    •   5  
      Outsourcing ServicesCloud Computing SecurityEncryption Techniquesrisk management in information technology systems
This presentation, provided by Mr. Edwards for Capitol College's IAE 684 Complementary Security class, offers unique insights on methods for encryption of data.
    • by 
    •   7  
      EncryptionImage EncryptionEncryption TechniquesPassword Encryption
    • by 
    •   5  
      Computer ScienceAccess ControlCloud ComputingEncryption Techniques
Cryptographic applications are becoming increasingly more important in today's world of data exchange, big volumes of data need to be transferred safely from one location to another at high speed. In this paper, the parallel... more
    • by  and +1
    •   33  
      EncryptionStegnography and Encryption and Eye Tracking and AlgorithmsElliptic curve cryptography for encryption and digital signatureMPI