Enviar búsqueda
Cargar
50120140504016
•
0 recomendaciones
•
237 vistas
IAEME Publication
Seguir
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 7
Descargar ahora
Descargar para leer sin conexión
Recomendados
Securing voip communications in an open network
Securing voip communications in an open network
eSAT Publishing House
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
IJCNCJournal
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANET
cscpconf
Refining data security in infrastructurenetworks support of multipath routing
Refining data security in infrastructurenetworks support of multipath routing
eSAT Journals
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
IJCNCJournal
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networks
LeMeniz Infotech
Mitigation of Selfish Node Attacks In Autoconfiguration of MANETs
Mitigation of Selfish Node Attacks In Autoconfiguration of MANETs
IJAAS Team
Recomendados
Securing voip communications in an open network
Securing voip communications in an open network
eSAT Publishing House
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
IJCNCJournal
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANET
cscpconf
Refining data security in infrastructurenetworks support of multipath routing
Refining data security in infrastructurenetworks support of multipath routing
eSAT Journals
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
IJCNCJournal
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networks
LeMeniz Infotech
Mitigation of Selfish Node Attacks In Autoconfiguration of MANETs
Mitigation of Selfish Node Attacks In Autoconfiguration of MANETs
IJAAS Team
A COOPERATIVE LOCALIZATION METHOD BASED ON V2I COMMUNICATION AND DISTANCE INF...
A COOPERATIVE LOCALIZATION METHOD BASED ON V2I COMMUNICATION AND DISTANCE INF...
IJCNCJournal
Network Monitoring System for University
Network Monitoring System for University
ijtsrd
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
IJECEIAES
IP and MAC Address
IP and MAC Address
City University, Dhaka, Bangladesh
Ip address
Ip address
Faculty of Computer Science Nangarhar University
Privacy preserving location sharing services for social
Privacy preserving location sharing services for social
Shakas Technologies
Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignment
IEEEFINALYEARPROJECTS
J046026268
J046026268
IJERA Editor
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networks
Nexgen Technology
Sms base file search & automatic contact saving technique using gsm 38521
Sms base file search & automatic contact saving technique using gsm 38521
EditorIJAERD
A web based approach: Acronym Definition Extraction
A web based approach: Acronym Definition Extraction
IRJET Journal
Performance Analysis of Different Modulation Schemes using Wi-Max And LTE
Performance Analysis of Different Modulation Schemes using Wi-Max And LTE
IRJET Journal
Pipelining Architecture of AES Encryption and Key Generation with Search Base...
Pipelining Architecture of AES Encryption and Key Generation with Search Base...
VLSICS Design
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Ijcem Journal
Software defined network based firewall technique
Software defined network based firewall technique
IAEME Publication
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data Security
Editor IJCATR
Limite
Limite
guest0b6ab9
Limite
Limite
Aristóteles Meneses
Gingivitis
Gingivitis
Percy Neyra
REENCARNAÇÃO E EVANGELHO
REENCARNAÇÃO E EVANGELHO
Jorge Luiz dos Santos
Tópico 07 - Limite de uma função
Tópico 07 - Limite de uma função
Ricardo Bruno - Universidade Federal do Pará
DOUTRINA DO BOM SENSO
DOUTRINA DO BOM SENSO
Jorge Luiz dos Santos
Más contenido relacionado
La actualidad más candente
A COOPERATIVE LOCALIZATION METHOD BASED ON V2I COMMUNICATION AND DISTANCE INF...
A COOPERATIVE LOCALIZATION METHOD BASED ON V2I COMMUNICATION AND DISTANCE INF...
IJCNCJournal
Network Monitoring System for University
Network Monitoring System for University
ijtsrd
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
IJECEIAES
IP and MAC Address
IP and MAC Address
City University, Dhaka, Bangladesh
Ip address
Ip address
Faculty of Computer Science Nangarhar University
Privacy preserving location sharing services for social
Privacy preserving location sharing services for social
Shakas Technologies
Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignment
IEEEFINALYEARPROJECTS
J046026268
J046026268
IJERA Editor
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networks
Nexgen Technology
Sms base file search & automatic contact saving technique using gsm 38521
Sms base file search & automatic contact saving technique using gsm 38521
EditorIJAERD
A web based approach: Acronym Definition Extraction
A web based approach: Acronym Definition Extraction
IRJET Journal
Performance Analysis of Different Modulation Schemes using Wi-Max And LTE
Performance Analysis of Different Modulation Schemes using Wi-Max And LTE
IRJET Journal
Pipelining Architecture of AES Encryption and Key Generation with Search Base...
Pipelining Architecture of AES Encryption and Key Generation with Search Base...
VLSICS Design
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Ijcem Journal
Software defined network based firewall technique
Software defined network based firewall technique
IAEME Publication
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data Security
Editor IJCATR
La actualidad más candente
(16)
A COOPERATIVE LOCALIZATION METHOD BASED ON V2I COMMUNICATION AND DISTANCE INF...
A COOPERATIVE LOCALIZATION METHOD BASED ON V2I COMMUNICATION AND DISTANCE INF...
Network Monitoring System for University
Network Monitoring System for University
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
IP and MAC Address
IP and MAC Address
Ip address
Ip address
Privacy preserving location sharing services for social
Privacy preserving location sharing services for social
Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignment
J046026268
J046026268
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networks
Sms base file search & automatic contact saving technique using gsm 38521
Sms base file search & automatic contact saving technique using gsm 38521
A web based approach: Acronym Definition Extraction
A web based approach: Acronym Definition Extraction
Performance Analysis of Different Modulation Schemes using Wi-Max And LTE
Performance Analysis of Different Modulation Schemes using Wi-Max And LTE
Pipelining Architecture of AES Encryption and Key Generation with Search Base...
Pipelining Architecture of AES Encryption and Key Generation with Search Base...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Software defined network based firewall technique
Software defined network based firewall technique
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data Security
Destacado
Limite
Limite
guest0b6ab9
Limite
Limite
Aristóteles Meneses
Gingivitis
Gingivitis
Percy Neyra
REENCARNAÇÃO E EVANGELHO
REENCARNAÇÃO E EVANGELHO
Jorge Luiz dos Santos
Tópico 07 - Limite de uma função
Tópico 07 - Limite de uma função
Ricardo Bruno - Universidade Federal do Pará
DOUTRINA DO BOM SENSO
DOUTRINA DO BOM SENSO
Jorge Luiz dos Santos
A reencarnação visão geral
A reencarnação visão geral
Anderson Dias
Aula 02 Cálculo de limites - Conceitos Básicos
Aula 02 Cálculo de limites - Conceitos Básicos
João Alessandro da Luz, Secretaria de Estado da Educação do Paraná, Campo Mourão - Pr
Desgastes dentales[2] (1)
Desgastes dentales[2] (1)
margarita8a5662
Destacado
(9)
Limite
Limite
Limite
Limite
Gingivitis
Gingivitis
REENCARNAÇÃO E EVANGELHO
REENCARNAÇÃO E EVANGELHO
Tópico 07 - Limite de uma função
Tópico 07 - Limite de uma função
DOUTRINA DO BOM SENSO
DOUTRINA DO BOM SENSO
A reencarnação visão geral
A reencarnação visão geral
Aula 02 Cálculo de limites - Conceitos Básicos
Aula 02 Cálculo de limites - Conceitos Básicos
Desgastes dentales[2] (1)
Desgastes dentales[2] (1)
Similar a 50120140504016
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
AM Publications
CrAlSim: A Cryptography Algorithm Simulator
CrAlSim: A Cryptography Algorithm Simulator
IRJET Journal
IEEE Information forensic and security Title and Abstract 2016
IEEE Information forensic and security Title and Abstract 2016
tsysglobalsolutions
Towards building a message retrieval facility via telephone
Towards building a message retrieval facility via telephone
eSAT Journals
Software defined network based firewall technique
Software defined network based firewall technique
IAEME Publication
Software defined network based firewall technique
Software defined network based firewall technique
IAEME Publication
Voice Based Email System For Visual Impaired Using AI
Voice Based Email System For Visual Impaired Using AI
IRJET Journal
50120130405028
50120130405028
IAEME Publication
A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE
IJERA Editor
Review on operating systems and routing protocols for wireless sensor
Review on operating systems and routing protocols for wireless sensor
IAEME Publication
IRJET- Adopting Encryption for Intranet File Communication System
IRJET- Adopting Encryption for Intranet File Communication System
IRJET Journal
REPORT_INTERNSHIP
REPORT_INTERNSHIP
ABHILASH RUDRA
A survey of cloud based secured web application
A survey of cloud based secured web application
IAEME Publication
50120140504006
50120140504006
IAEME Publication
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
IRJET Journal
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
zeyadosama505
Implementation of usb to usb bridge for computer independent data transfer
Implementation of usb to usb bridge for computer independent data transfer
IAEME Publication
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
IAEME Publication
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
IJERA Editor
IRJET- Voice Modulation and Verification for Smart Authentication System
IRJET- Voice Modulation and Verification for Smart Authentication System
IRJET Journal
Similar a 50120140504016
(20)
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
CrAlSim: A Cryptography Algorithm Simulator
CrAlSim: A Cryptography Algorithm Simulator
IEEE Information forensic and security Title and Abstract 2016
IEEE Information forensic and security Title and Abstract 2016
Towards building a message retrieval facility via telephone
Towards building a message retrieval facility via telephone
Software defined network based firewall technique
Software defined network based firewall technique
Software defined network based firewall technique
Software defined network based firewall technique
Voice Based Email System For Visual Impaired Using AI
Voice Based Email System For Visual Impaired Using AI
50120130405028
50120130405028
A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE
Review on operating systems and routing protocols for wireless sensor
Review on operating systems and routing protocols for wireless sensor
IRJET- Adopting Encryption for Intranet File Communication System
IRJET- Adopting Encryption for Intranet File Communication System
REPORT_INTERNSHIP
REPORT_INTERNSHIP
A survey of cloud based secured web application
A survey of cloud based secured web application
50120140504006
50120140504006
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
Implementation of usb to usb bridge for computer independent data transfer
Implementation of usb to usb bridge for computer independent data transfer
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
IRJET- Voice Modulation and Verification for Smart Authentication System
IRJET- Voice Modulation and Verification for Smart Authentication System
Más de IAEME Publication
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
Más de IAEME Publication
(20)
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
Último
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Juan lago vázquez
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
apidays
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
danishmna97
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Rustici Software
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Jago de Vreede
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
The Digital Insurer
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
MadyBayot
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Sandro Moreira
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
rafiqahmad00786416
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Zilliz
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Orbitshub
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
MIND CTI
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Orbitshub
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Edi Saputra
Último
(20)
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
50120140504016
1.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 150-156 © IAEME 150 SECURED PATTERN BASE ENCRYPTION APPROACH FOR INTRANET CHAT SERVER FOR WIRED NETWORK OmarAbdulmagedHammood, Dr. AliMakkiSagheer*, Mr. Surya PrakashMishra** Department of Computer Science, ALTURATH UNIVERSITY, BAGHDAD IRAQ -10001 *Department of Computer Science, ALANBAR UNIVERSITY, ALANBAR,IRAQ -31001 **Department of Computer Science & Information Technology, SHEPHERD SCOOL OF ENGINEERING & TECHNOLOGY / SHIATS, Allahabad (U.P.) INDIA-211007. ABSTRACT A system server for a channel-based network including one or more Internet sites and one or more user terminals. The system server includes a channel table database storing a master channel table that includes a list of channel numbers, each channel number having an associated Internet address and an associated Internet site name. Each Internet site of the network is addressable by an associated Internet address stored in the master channel table. The system server includes a network database and an update manager database. The system server identifies each user terminal requesting service by comparing transmitted identification information with authorized user information stored in the network database. The system server also compares a channel table version number from the requesting user terminal with a version number stored in the update manager database that is associated with the master channel table, and notifies each requesting user terminal when updated channel table information is available. At each user terminal, a user reads the channel numbers and associated Internet site names from a menu displaying the downloaded channel table, selects an Internet site name from the displayed menu, and enters the channel number associated with the selected Internet site name using an input device that is similar to a television remote control. INTRODUCTION The goal of this thesis is to present a novel and systematic approach to a P2P (Point-to point) non-repudiation and adaptive-multimedia-based communication. A non-reputable communication often involves a transparent mechanism through which, no party involved in the communication can deny having participated in the whole or a part of the communication Therefore security is one of the key points being considered in this thesis. As traffic between involved parties is multimedia-enabled, INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 4, April (2014), pp. 150-156 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
2.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 150-156 © IAEME 151 (including voice, text, file-sharing.) In the past few years, local computer networks for the interconnection of computers and shared resources within a small area such as a building or a campus have rapidly increased in popularity. These networks support applications such as file transfers and electronic mail between autonomous computers. They shared the use of large computers and expensive peripherals, and distributed computation. Typically, these networks have bandwidths in the range 0.1-10 Mbps and span distances of 0.1-10 km. Interest has focused on the use of local computer networks for voice and other real-time applications. A local computer network can be used to support voice communications (in addition to data traffic)., thereby supplementing or eliminating the internal telephone exchanges (PBX"s) currently used in offices and campuses. New levels of functionality can be achieved by the integration of digitized voice into data systems such as text editors and electronic mail systems. In this paper we present the results of some measurements aimed at evaluating the feasibility of a 3 Mbps experimental Ethernet located at the Xerox Palo Alto Research Centers., for packet-voice applications. These measurements show that, within certain bounds. The network can be used to carry voice traffic successfully. These results can also be used to validate theoretical models which can then be used to predict the performance of other implementations of Ethernet like architectures, Traditionally, several methods can be used to encrypt data streams, all of which can easily be implemented through software, but not so easily decrypted when either the original or its encrypted data stream are unavailable. (When both source and encrypted data are available, code-breaking becomes much simpler, though it is not necessarily easy). Architecture Design The purpose of this document is to provide an architectural design for the Text / Voice server. The design will show the presentation tier, the middle tier consisting of classes, sequence diagrams, and the data tier consisting of the database design diagram. Figure 1: Cloud Implementation model
3.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 150-156 © IAEME 152 TYPES OF CRYPTOGRAPHIC ALGORITHMS There are several ways of classifying cryptographic algorithms. For purposes of this report they will be categorized based on the number of keys that are employed for encryption and decryption, and further defined by their application and use. The following are the three types of Algorithm that are discussed * Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption * Public Key Cryptography (PKC): Uses one key for encryption and another for decryption * Hash Functions: Uses a mathematical transformation to irreversibly "encrypt" information Figure 2: Three types of cryptography: secret-key, public key, and hash function Website Functions This website will allow access only to authorized users with specific roles (administrator, user) depending upon user’s role, he/she will be able to access only specific modules of the system. A summary of the major functions that the website will perform are as follows:- Login facility for enabling only authorized access to the system. - User will be able to request/accept the selected entries from the list - Administrator will be able to add/modify/delete/update and alter data (i.e. product details) at the back-end as per the requirements. - Administrator will be responsible for managing user account.
4.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976 ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. REGISTER TO BE A MEMBER: photographs. PROFILE: Logged users can see their details and if they wish to chang they can edit it. FRIENDZ: Logged users can see their friend list and if they wish to add friends. SCRAPBOOK: This module enables the user to send the scarps to their friends. TESTIMONIAL: This module enables the user to send the PHOTO GALLERY: This module enables the user to upload the photos to their photo gallery and mention their album. Figure International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6375(Online), Volume 5, Issue 4, April (2014), pp. 150-156 © IAEME 153 REGISTER TO BE A MEMBER: Logged users can EDIT their PROFILE, and upload the Logged users can see their details and if they wish to change any of their information Logged users can see their friend list and if they wish to add friends. This module enables the user to send the scarps to their friends. This module enables the user to send the testimonial to their friends. This module enables the user to upload the photos to their photo gallery and Figure 3: The Pattern Matching Process International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), Logged users can EDIT their PROFILE, and upload the e any of their information testimonial to their friends. This module enables the user to upload the photos to their photo gallery and
5.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 150-156 © IAEME 154 Figure 4: Process to recognize 4.1 Result The application will be defined for text or voice communications, this has been done by using security key basis as encryption and decryption, the key will be modulated by the crypto-graphical model, the encryption has been done by encrypted model, by using this model the system is generated the communication channel for message sending and receiving, the automated system generated by encrypted environment so that the system will be secured. 4.2 DISCUSSION Two very different groups of techniques are known in the domain of string pattern matching. One deals with exact string pattern matching, while the other deals with partial or incomplete string pattern matching. The latter group addresses automatic word correction and the identification of typographic errors. Assuming that the pattern length is no longer than the unit memory size of the machine, the shift-or algorithm is an efficient algorithm that adapts easily to a wide range of approximate string matching problems. This algorithm is based on finite automata theory, such as the Knuth-Morris-Pratt algorithm, and exploits the finiteness of the alphabet, as in the Boyer-Moore algorithm.In pattern recognition works, genetic algorithms are widely used to identify occurrences of complex patterns, although they are regarded primarily as a problem-solving method. Genetic algorithms are based on ideas from population genetics; they feature populations of genotypes (characteristics of an individual) stored in memory, differential reproduction of these genotypes, and variations that are created in a manner analogous to the biological processes of mutation and crossover. Genetic algorithms are powerful tools for solving complex pattern-matching problems, especially when the matching is incomplete or inexact or when it occurs on repetitive patterns separated by unmatched patterns, as it can be in searches for long DNA sequences that take into account possible alterations, from single deletions or insertions to crossovers.Most exact string pattern-matching algorithms are easily adapted to deal with multiple string pattern searches or with wildcards. We present the full code and concepts underlying two major different classes of exact string search pattern algorithms, those working with hash tables and those based on heuristic skip tables. Exact string matching consists of finding one or, more generally, all of the occurrences of a
6.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 150-156 © IAEME 155 pattern in a target. The algorithmic complexity of the problem is analyzed by means of standard measures of the running time and amount of memory space required by the computations. SUMMARY AND CONCLUSION Automatically scanning a message for certain information according to predefined rules; setting a security attribute to a voice channel security level (VCSL) associated with the message when the certain information is present, the certain information including one or more words, phrases, or addresses that satisfy the predefined rules, storing the message in a mailbox of a recipient in the UMS, receiving a request from the recipient to listen to the message over a voice communication channel, encrypting the voice communication channel over which to play the message. REFERENCES 1. EOTP – Static Key Transfer. Defuse.ca (2012-07-13). Retrieved on 2012-12-21. 2. Barkan, Elad; Eli Biham; Nathan Keller (2003). "Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication". Cryptome 2003: 600–16. 3. Barkan, Elad; Eli Biham; Nathan Keller. "Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication by Barkan and Biham of Technion (Full Version)". 4. Gueneysu, Tim; Timo Kasper; Martin Novotný; Christ of Paar; Andy Rupp (2008). "Cryptanalysis with COPACOBANA". Transactions on Computers Nov. 2008 57: 1498–1513. 5. Nohl, Karsten; Chris Paget (2009-12-27). "GSM: SRSLY?". 26th Chaos Communication Congress (26C3):. Retrieved 2009-12-30. 6. "Yubico AB". Bloomberg Businessweek. Retrieved July 13, 2011. 7. Ericka Chickowski (2010-11-03). "Images Could Change the Authentication Picture". Dark Reading. 8. "Confident Technologies Delivers Image-Based, Multifactor Authentication to Strengthen Passwords on Public-Facing Websites". 2010-10-28. 9. BRB – Banco de Brasília – BRB Banknet. Portal.brb.com.br. Retrieved on 2012-12-21. 10. The Register article. The Register article (2005-10-12). Retrieved on 2012-12-21. 11. Washington Post Security Blog. Blog.washingtonpost.com. Retrieved on 2012-12-21 12. D. P. Agrawal and Q-A. Zeng, Introduction to Wireless and Mobile Systems (2nd Edition, published by Thomson, April 2005) ISBN 978-0-534-49303-5 13. J.K. and K. Ross, Computer Networking (2nd Ed, Addison Wesley, 2003) ISBN 978-0-321- 17644-8 14. The schematics are illustrated in U.S. Patent 613, 809 and describes "rotating coherers". 15. Rina Damdoo, “Machine Translation using Mutiplexed PDT for Chatting Slang”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 125 - 134, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. 16. Prof. Maher K. Mahmood and Jinan N. Shehab, “Image Encryption and Compression Based on Compressive Sensing and Chaos”, International Journal of Computer Engineering & Technology (IJCET), Volume 5, Issue 1, 2014, pp. 68 - 84, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. 17. Muna Ghazi and Dr. Hanaa M. A. Salman, “A Harmonic Secret Sharing and Permutation Based Document Image Authentication”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 5, 2014, pp. 23 - 30, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
7.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 150-156 © IAEME 156 AUTHORS Omar AbdulmagedHammood was born in Falluja at June 1986, he received his B.Sc. from Baghdad, ALTURATH University, in computer science at 2010, Ministry of higher education and scientific research, Republic of Iraq, he completed his M.Sc in computer science form Sam higginbottom Institute of Agriculture Technology & sciences at 2014, Allahabad, U.P, India. Dr. Ali Makki Sagheer was born in Basrah 1979. He got his B.SC. of Information system in computer Science department at the university of Technology (2001)- Iraq, M.Sc. in Data security from the university of Technology (2004)-Iraq and Ph.D in computer science from the university of Technology (2007) –Iraq. He is interesting in the following fields (Cryptology, Information security, Number Theory, Multimedia Compression, Image Processing, Coding Systems and Artificial Intelligence). He published many papers in different conferences and scientific journals. Mr. Surya Prakash Mishra is born in 1982, (Uttar Pradesh) India. He received his B.Sc. Degree from Allahabad University (AU), M.C.A in Computer Science from U.P. Tech University and he is pursuing Ph.D. SHIATS- DU Allahabad in 2014. His Area of specialization in Computer Algorithms, Java programing, DBMS. He is interested in Database Mgt. System; Data Structure; Java Programming; and Object Oriented Programming.
Descargar ahora