Many services which we use today require us to login to ensure security and confidentiality. As the number of services increase, it has become quite difficult to remember the username and password for each of them. In th...
“Security” is a one of the important issues in cloud computing environment. Cloud computing is used to deliver software, storage and processing for millions of users across the world. In the user environment, it is the c...
In most organizations the historical dataset is dynamic which means it is periodically updated with fresh data. In such an environment, when the counterpart organizations need to share their information for a decision ma...
ZigBee is a current wireless standard based on IEEE 802.15.4 used in Wireless Sensor Networks (WSNs) stimulates many interests. In a built WSN, the information about some part of interest may need further research such t...
Network attack detection is an essential technology in business as well as dynamic research area. It is essential for security of the information. Attacks on network can cause legitimate users being strived or denied ser...
EP ID EP89731
DOI -
Views 162
Downloads 0
How To Cite
P. Iswarya, Dr. V. Radha (2015). . International Journal of Computer Science & Engineering Technology, 6(6),
386-391. https://europub.co.uk/articles/-A-89731
Sign In Europub
For faster login or register use your social account.
ACCESSING DISTRIBUTED SERVICES WITH ONE TIME TOKEN GENERATION
Many services which we use today require us to login to ensure security and confidentiality. As the number of services increase, it has become quite difficult to remember the username and password for each of them. In th...
A LITERATURE SURVEY ON MULTITHREADING TECHNIQUES TO AVOID DATA LOSS IN CLOUD STORAGE
“Security” is a one of the important issues in cloud computing environment. Cloud computing is used to deliver software, storage and processing for millions of users across the world. In the user environment, it is the c...
An Incremental Sanitization Approach in Dynamic Databases
In most organizations the historical dataset is dynamic which means it is periodically updated with fresh data. In such an environment, when the counterpart organizations need to share their information for a decision ma...
A Cluster Based Optimization Technique with Adoptive Framework for ZigBee WSN
ZigBee is a current wireless standard based on IEEE 802.15.4 used in Wireless Sensor Networks (WSNs) stimulates many interests. In a built WSN, the information about some part of interest may need further research such t...
Real Time Detection Of Network Attacks Using Signature Based Approach
Network attack detection is an essential technology in business as well as dynamic research area. It is essential for security of the information. Attacks on network can cause legitimate users being strived or denied ser...