• No results found

[PDF] Top 20 A survey of various Cryptographic techniques and their Issues

Has 10000 "A survey of various Cryptographic techniques and their Issues" found on our website. Below are the top 20 most common "A survey of various Cryptographic techniques and their Issues".

A survey of various Cryptographic techniques and their Issues

A survey of various Cryptographic techniques and their Issues

... technique, various methods that monolithically bind a cryptographic key with the biometric template of a user stored in the database in such a way that the key cannot be revealed without a successful ... See full document

6

A Survey in Cloud Computing : Security Issues and Their Solutions

A Survey in Cloud Computing : Security Issues and Their Solutions

... under cryptographic implementation. Various cryptographic techniques used to overcome the security issues faced by cloud service provider and ...security issues and its solutions ... See full document

5

A Survey of Issues and Techniques of Web Usage Mining

A Survey of Issues and Techniques of Web Usage Mining

... days various issues related to log files ...this survey paper we discuss the phases of WUM, architecture of WUM, issues related to WUM and also discuss the future ... See full document

5

A survey about the latest trends and research issues of cryptographic elements

A survey about the latest trends and research issues of cryptographic elements

... of cryptographic schemes persist in which each has its own affirmative and feeble ...This survey compares trendy encryption techniques for convinced selection of both key and cryptographic ... See full document

10

A Comparative Survey of Various Cryptographic Techniques

A Comparative Survey of Various Cryptographic Techniques

... hacking issues and more especially using more superior methods, it is prudent that a lot of IT research be intended for finding answer to the rising threats to the online or internet system , including the network ... See full document

10

Applications, Issues and Techniques associated with data mining in various fields: A Survey Paper

Applications, Issues and Techniques associated with data mining in various fields: A Survey Paper

... Data mining than emerging in agriculture field for crop yield analysis a with respect to four parameters namely year, rainfall, production and area of sowing. Yield prediction is a very important agricultural problem ... See full document

11

Various Security Threats and Issues in Wireless Networks: A Survey

Various Security Threats and Issues in Wireless Networks: A Survey

... This enables attackers in the immediate vicinity of a wireless network to perform a number of attacks that are not found in traditional wired networks. This chapter will review the threats that are unique to wireless ... See full document

5

Security Issues and Their Techniques in DBMS   A Novel Survey

Security Issues and Their Techniques in DBMS A Novel Survey

... In this paper we have identified the vulnerabilities, threats and security methods of database management system with the help survey conducted on researches of database security. The result of the survey ... See full document

5

A Survey on the Security Features of Cryptographic Techniques in Mobile Devices

A Survey on the Security Features of Cryptographic Techniques in Mobile Devices

... of cryptographic algorithms in mobile computing, the hackers don’t get the chance to access the mobile ...units. Various cryptographic algorithms have been used to maintain security in mobile devices ... See full document

6

Measurement Issues of Income and Non-Income Welfare Indicators: Assessment of Pakistan’s Pro-Poor Growth

Measurement Issues of Income and Non-Income Welfare Indicators: Assessment of Pakistan’s Pro-Poor Growth

... while World Bank (2009) uses international poverty rate of US $1.25 per day level of poverty. Pakistan Economic Survey (various issues) estimated offi cial poverty line of 2350 calories level of ... See full document

10

Security of Cloud Storage System using Various Cryptographic Techniques

Security of Cloud Storage System using Various Cryptographic Techniques

... utilized as a part of the cloud computing environment are basically utilized for giving security to a file and not for the entire communication system [9]. Additionally, present security models are in some cases ... See full document

7

Various Techniques of DDoS Attacks Detection & Prevention at Cloud: A Survey

Various Techniques of DDoS Attacks Detection & Prevention at Cloud: A Survey

... To evade these issues, most of the Cloud providers use firewalls. Firewall is the border access points of system and it provides protection at first place i.e., at the border of any environment or network. Since ... See full document

11

A Survey on Data Stream and Its Various Techniques

A Survey on Data Stream and Its Various Techniques

... In this paper [11], creators proposed structure named as an ActMiner, which stands for Active Classifier for Data Streams with novel class Miner, performs classification and novel class location in data streams while ... See full document

6

A Survey on Various Underwater Image Enhancement Techniques

A Survey on Various Underwater Image Enhancement Techniques

... huge issues; (a) light weakening effect, (b) light disturbing effect, (c) light refraction impact those 1st issue is over those weakening impacts from claiming light, the second issue may be something like ... See full document

8

A Survey on Enhancement of Text Security Using  Steganography and Cryptographic Techniques

A Survey on Enhancement of Text Security Using Steganography and Cryptographic Techniques

... in various forms for thousands of ...The survey of Johnson [6] appeared in the “Information hiding” book, which limits its distribution compared to a Journal paper which can be more ...the techniques ... See full document

5

A Survey on Various Cryptographic Algorithms for Security Enhancement

A Survey on Various Cryptographic Algorithms for Security Enhancement

... security techniques may probably lead to great loss for the ...Proper survey discussed on cryptographic algorithms in the paper, may help many cloud users to make proper ...between ... See full document

5

A Survey on Diverse DNA Cryptographic Techniques

A Survey on Diverse DNA Cryptographic Techniques

... Since the demand for storage has increased, the need for reliable and safe storage of information also increased as well. This gave a way to the fire current and upcoming technologies for the efficient storage of data. ... See full document

5

A SURVEY AND ANALYSIS OF VARIOUS IMAGE ENHANCEMENT TECHNIQUES

A SURVEY AND ANALYSIS OF VARIOUS IMAGE ENHANCEMENT TECHNIQUES

... some techniques within the space of image improvement for brightness preservation as brightness preservation is in nice demand within the shopper natural philosophy field, once the image is effectively ... See full document

11

A Survey of various Techniques for the Detection of Optic Disc

A Survey of various Techniques for the Detection of Optic Disc

... ABSTRACT: Eyes are one of the most important sensory organs in the human body as it renders vision. The obstruction of blood flow in optic disc cause changes because the optic disc is the entry point where the blood ... See full document

7

A SURVEY ON VARIOUS AUTHENTICATION TECHNIQUES AND GRAPHICAL PASSWORDS

A SURVEY ON VARIOUS AUTHENTICATION TECHNIQUES AND GRAPHICAL PASSWORDS

... this survey we have reached to the conclusion that how the authentication security is important, but at the time of focusing on the security we also have to consider the ease of use, by the user ...this ... See full document

7

Show all 10000 documents...