Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Applying of security mechanisms to middle and high layers of OSI/ISO network model
    • by 
    •   20  
      DoS AttackAuthenticationDNSProtocol
Data leakage ad security of data is an essential component of cloud computing, most of the data has been proceed through third party application (TPA) and user are unaware about the security essentials. The internet based computing model... more
    • by  and +2
    •   6  
      Cloud ComputingData SecurityData leakageSHA
    • by  and +2
    •   18  
      Mobile Ad Hoc NetworksEmbedded SystemsCryptographyGlobal Positioning System
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor... more
    • by 
    •   14  
      Computer ScienceInformation SecurityComputer SecurityCryptography
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor... more
    • by 
    •   14  
      Computer ScienceInformation SecurityComputer SecurityCryptography
Wi-Fi protected access (WPA) has provided serious improvements over the now deprecated wired equivalent privacy (WEP) protocol. WPA, however, still has some flaws that allow an attacker to obtain the passphrase. One of these flaws is... more
    • by 
    •   4  
      Reconfigurable ComputingFPGAElectrical And Electronic EngineeringSHA
A hash function maps a variable length input into a fixed length output. The hash functions that are used in the information security related applications are referred as cryptographic hash functions. Hash functions are being used as... more
    • by 
    •   4  
      Computer ScienceMDHash FunctionSHA
    • by 
    •   15  
      Electromagnetic CompatibilityData CompressionAlgorithmCloud Computing
    • by 
    •   15  
      Fuzzy LogicFuzzy set theoryFuzzy SetsFuzzy Systems
Cloud computing could be a platform for enhancing capabilities and developing potentialities at run time while not adopting new infrastructure, human resources, or software package systems. Also cloud computing originated from an... more
    • by 
    •   3  
      Cloud SecurityRSASHA
    • by 
    •   5  
      Computer ScienceBlakeJHARKHANDHash Functions
Security in wireless sensor network (WSN) has become an increasing necessity due to the diverse application areas being implemented. Application areas such as military surveillance and environmental monitoring need to be guided against... more
    • by 
    •   9  
      SecurityComplexityWireless Sensor Network SecurityWSN (Wireless sensor network)
    • by 
    •   14  
      User InterfacePipelineJitterWireless Lan
    • by 
    •   21  
      SchedulingCircuits and SystemsCryptographyField-Programmable Gate Arrays
    • by 
    •   30  
      BioinformaticsOpticsImage ProcessingInformation Security
    • by 
    •   13  
      HydrogenKineticsBiogasMultidisciplinary