To search, Click below search items.
All Published Papers Search Service
Title
Secure and Reliable Unstructured Data Sharing in Multi-Cloud Storage using the Hybrid Crypto System
Author
Dr.K.Subramanian, F.Leo John
Vol. 17 No. 6 pp. 196-206
Keywords
Multi-Cloud Storage, Malicious Insider, Cryptography, Data Sharing, Index Based Data Slicing, Malicious Files, Counter Attack
Detecting Input Validation Attacks of Web Apps and Developing Metrics for Their Ranks
Mehrnoush Vaseghipanah, Nasser Modiri and Sam Jabbehdari
Vol. 17 No. 6 pp. 191-195
Input Validation Attacks, IV Attacks Detection, Detection Metrics, Web Apps Attack Detection.
Enhancing Cloud Security Using VKC as a Service
Syed Saqib Raza Rizvi, Muhammad Asad Ullah, Sagheer Abbas, Shahid Naseem
Vol. 17 No. 6 pp. 185-190
Cryptography, AES, VKC, Privacy, Threats.
Centroid Energy-Based Sleep Scheduling Design in Dense Wireless Sensor Networks using Evolutionary Algorithms
Seyed Mojtaba Hosseinirad¢Ó
Vol. 17 No. 6 pp. 171-184
Sleep scheduling, wireless sensor network, LEACH, SEP, energy conservation.