Abstract

Authors and Affiliations

P. Iswarya , Dr. V. Radha

Keywords

Related Articles

Operations on Signed Numbers

Signed integers are normally represented using 2’s complement representation. Addition and subtraction of signed numbers is done similar to that of unsigned numbers. However carry (or borrow) is simply ignored. Unlike un...

Survey on energy consumption in wireless IOT 

This paper focuses the Internet of Things. Main enabling feature of this promising model is the integration of several technologies and communication solutions. Identification and tracking technologies, wired and wireles...

DIGITAL WATERMARKING: A SURVEY 

This is the era of digital information as digital image plays a vital role in every field of human lives. A digital image is both informative and flexible since it is easy to edit and redistribute. The vulnerability of d...

Data Anonymization Approach For Privacy Preserving In Cloud

Private data such as electronic health records and banking transactions must be shared within the cloud environment to analysis or mine data for research purposes. Data privacy is one of the most concerned issues in big...

Security against attacks in TOR networks

TOR( The Onion Router) network is a system that provide anonymity for its client by routing the client packets via various volunteering networks, such routing conceals the clients location & activity thus making traf...

Download PDF file
  • EP ID EP89731
  • DOI -
  • Views 129
  • Downloads 0

How To Cite

P. Iswarya, Dr. V. Radha (2015).  . International Journal of Computer Science & Engineering Technology, 6(6), 386-391. https://europub.co.uk/articles/-A-89731