• No results found

secure data transfer

Secure Data Transfer and 802.11 Channel Usage in Networking

Secure Data Transfer and 802.11 Channel Usage in Networking

... ABSTRACT: Data exchange rate is an estimation of the measure of information sent between two focuses on a system in a given time ...their data and information to the assistance of remote transmission some ...

6

Key Modulation Technique for Secure Data Transfer Using Image Encryption

Key Modulation Technique for Secure Data Transfer Using Image Encryption

... AES (Advanced Encryption Standard) is asymmetric encryption algorithm. The algorithm was developed by two Belgian cryptographers Joan Daemen and Vincent Rijmen.AES was designed to be efficient in both hardware and ...

6

Secure data transfer using visible light communication Technique

Secure data transfer using visible light communication Technique

... The incandescent bulb that has been widely used to lit our surroundings since its invention over a century ago but now we are using this LED everywhere, why? Because they consumed low power and low cost and very ...

6

A Study on Secure Data Transfer in Cluster based Wireless Sensor Networks

A Study on Secure Data Transfer in Cluster based Wireless Sensor Networks

... more secure and effective method of data transmission is main issues for cluster based wireless sensor network, many WSNs are found in noise, avoided and often involving by conflict or opposition in ...

5

Trust Management Schemes for Secure Data Transfer in MANETs : A Survey

Trust Management Schemes for Secure Data Transfer in MANETs : A Survey

... Probabilistic misbehavior detection scheme was proposed for secure DTN routing toward efficient trust establishment. iTrust introduced an idea that a periodically available Trusted Authority (TA) to judge the ...

7

An Efficient User Authentication and Secure Data Transfer for End_to_End Routing Protocol in Wireless Sensor Network

An Efficient User Authentication and Secure Data Transfer for End_to_End Routing Protocol in Wireless Sensor Network

... Our proposed system we are implementing a novel design protocol for performing authentication and key generation process. It can also implement concepts for finding shortest route from source node to destination node. In ...

6

Safe and Secure Data Transfer in Mobile AD HOC Networks using Multilevel Encryption Techniques

Safe and Secure Data Transfer in Mobile AD HOC Networks using Multilevel Encryption Techniques

... our data and damage it and this type of technique is more secure and safe data transmission as ...our data being sent and we need to also ensure that we get back the data in original ...

5

Data Transfer for Secure Information by Using Symmetric Key Algorithm

Data Transfer for Secure Information by Using Symmetric Key Algorithm

... a secure data transfer communication system that employs cryptography to encrypt and decrypt the secret message to be transmitted over a secure channel ...be secure of Data ...

5

An Optimal Approach to Select Watchdogs using Secure Key management Schemes in Clustered Wireless Sensor Networks S. Rajasoundaran, P. Narayanasamy, S. Kasirajan

An Optimal Approach to Select Watchdogs using Secure Key management Schemes in Clustered Wireless Sensor Networks S. Rajasoundaran, P. Narayanasamy, S. Kasirajan

... (SLEACH), secure data transfer through session establishment CKM with inclusion of pair wise key establishment (RCD and RMCM) in case of intra-cluster communication and triple key establishment in ...

8

Secure and Economical Data Transfer in Wireless Sensor Network using Cluster Approach

Secure and Economical Data Transfer in Wireless Sensor Network using Cluster Approach

... node. Secure data transfer is most important difficulty for ...firmly data transmission is important and most practical imaginative and prescient in ...

5

Secure Sharing of Data in the Cloud Environment

Secure Sharing of Data in the Cloud Environment

... shared data, the information face each cloud-specific and conventional insider ...threats. Secure information sharing among a group that counters insider threats of legitimacy, however malicious users are ...

5

SECURED CERIFICATE THROUGH ZKP PROTOCOL IN WIRELESS ADHOC NETWORKS

SECURED CERIFICATE THROUGH ZKP PROTOCOL IN WIRELESS ADHOC NETWORKS

... new secure routing protocol (SRP) with quality of service (QoS) support using certificate repository (Self-organized packet transmission), which includes secure route discovery; secure route setup, ...

11

Study of the relationship between the web and data warehouses (data transfer between the web and data warehouses)

Study of the relationship between the web and data warehouses (data transfer between the web and data warehouses)

... raw data flow to be rejected or summarized and passing through the granular director (Inmon, ...the data back to the Web environment are not directly or completely ...The data warehouse simply do not ...

7

Privacy Preserving Remote Data Transfer in Web Service QOS

Privacy Preserving Remote Data Transfer in Web Service QOS

... important data. The proposed protocol supports data integrity, confidentiality, authentication and authorization at the block level, and also supports public ...be secure against an entrusted ...

6

Feasibility   and  Infeasibility  of  Secure  Computation  with  Malicious  PUFs

Feasibility and Infeasibility of Secure Computation with Malicious PUFs

... Ostrovsky et al. [16], however, observed that the previous results implicitly assume that all PUFs, including those created by the attacker, are honestly generated. They point out that this may not be a reasonable ...

21

Reversible Data Hiding in Encrypted Images Using Room Reservation Approach and Visual Cryptography for Color Images

Reversible Data Hiding in Encrypted Images Using Room Reservation Approach and Visual Cryptography for Color Images

... Reversible data hiding (RDH) is a technique which can transfer the secret message or data from the content owner to the authorized recepient with the use of carrier ...the data via the ...

7

An Efficient Model for Secure Data Publishing

An Efficient Model for Secure Data Publishing

... An algorithm was designed based on the proposed model. A tool has also been developed to implement the algorithm. The tool is named as ComEncColor (CEC). CEC is developed in JAVA which can encrypt transactional ...

5

Secure Energy Efficient Data Transmission over WSNs

Secure Energy Efficient Data Transmission over WSNs

... he Wireless Sensor Network is collection of various sensor nodes spreads in the environment. These nodes are continuously monitoring specific region in environment. These nodes are able to sense the environment change ...

5

Secure Data Storage over Cloud Using Content Features Processing

Secure Data Storage over Cloud Using Content Features Processing

... The secure data storage over a cloud in this paper brings suitable way to store and access files provided with confidentiality, integrity and authentication ...the data admin side, data ...

13

A Secure Role Based Encryption of Data Sharing for Dynamic Groups in the Cloud

A Secure Role Based Encryption of Data Sharing for Dynamic Groups in the Cloud

... of data sharing, giving security and privacy preservation are still challenging issues, especially for an untruth cloud due to the collusion ...the secure key distribution without assuming any secure ...

5

Show all 10000 documents...

Related subjects