An Identity-Based Secure Authenticated Framework by Using ECC in Cloud Computing
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 2
Abstract
"Cloud Computing with Elliptic Curve Cryptography (ECC) is an entirely novel area and has inconceivable scope of research. It is a talented saleable infrastructure archetype that promises to exterminate require for maintaining exclusive computing amenities by companies and institutes comparable. It has obsessed insubstantial, technical, economic, and client experience characteristics. All through the use of virtualization and resource time allocation, clouds provide with a testing position of physical resources a gargantuan client base with dissimilar requirements. However, a user uses public network for the duration of right of entry of cloud services at the same time an adversary knows how to get full control over the public network. Therefore, a user ought to advocate a mechanism in which user and server can authenticate each other and generate a safe session. In this projected protocol, user and server established a session key and can communicate securely through the public network. This recently protocol decreases the cost of computation deeply and compared with previous existing protocol. Detailed network security investigations have been made to authenticate the proficiency of the protocol. Additional, this protocol has the argument to likely attacks in cloud computing. "
Impact of Training Packages on Cheese Making and the Socio Economic Lives for Effort to Reduce Poverty
Purpose of this study is to assess the impacts of training packages on Cheese making on the Socio-economic lives of the poor communities in Korom Village, south Kordofan, Sudan. Methods of the study was to target all hou...
Hybrid Crossover - Mutation Pair for Genetic Algorithm in Solving Fuzzy Shortest Path Problem - Predominant and Subordinate Ants
The reasons behind the evolution of fuzzy shortest path problem are, finding the path of least cost from source vertex to the destination vertex in the graph G={V,E}. Fuzzy shortest path problem comprises of fuzzy number...
A Survey on Image Contrast Enhancement
"Abstract: Image Contrast enhancement without affecting other parameters of an image is one of the challenging tasks in image processing. The quality of poor images can be improved using various Image Contrast Enhanceme...
Taxonomic Review of Indian Pipunculids in Comparison to Pipunculids of Other Countries
The taxonomy of Pipunculids is largely neglected in India. Brunetti, 1912, 1915 &1923 and Subramaniam, 1922 worked on Indian Pipunculids. Since 1923 no work was done on the Indian Pipunculids till 1971. Then Hardy, 1971,...
Recommendation System Techniques in E-Commerce System
Recommender Systems help consumers navigating through large product miscellany, making decisions in e-commerce environments and overcome information overload. These systems take the behaviour, opinions and tastes of a la...