Abstract

Authors and Affiliations

P. Iswarya , Dr. V. Radha

Keywords

Related Articles

ACCESSING DISTRIBUTED SERVICES WITH ONE TIME TOKEN GENERATION

Many services which we use today require us to login to ensure security and confidentiality. As the number of services increase, it has become quite difficult to remember the username and password for each of them. In th...

A LITERATURE SURVEY ON MULTITHREADING TECHNIQUES TO AVOID DATA LOSS IN CLOUD STORAGE

“Security” is a one of the important issues in cloud computing environment. Cloud computing is used to deliver software, storage and processing for millions of users across the world. In the user environment, it is the c...

An Incremental Sanitization Approach in Dynamic Databases

In most organizations the historical dataset is dynamic which means it is periodically updated with fresh data. In such an environment, when the counterpart organizations need to share their information for a decision ma...

A Cluster Based Optimization Technique with Adoptive Framework for ZigBee WSN

ZigBee is a current wireless standard based on IEEE 802.15.4 used in Wireless Sensor Networks (WSNs) stimulates many interests. In a built WSN, the information about some part of interest may need further research such t...

Real Time Detection Of Network Attacks Using Signature Based Approach

Network attack detection is an essential technology in business as well as dynamic research area. It is essential for security of the information. Attacks on network can cause legitimate users being strived or denied ser...

Download PDF file
  • EP ID EP89731
  • DOI -
  • Views 162
  • Downloads 0

How To Cite

P. Iswarya, Dr. V. Radha (2015).  . International Journal of Computer Science & Engineering Technology, 6(6), 386-391. https://europub.co.uk/articles/-A-89731