Zobrazeno 1 - 10
of 13
pro vyhledávání: '"B J Santhosh Kumar"'
Autor:
B J Santhosh Kumar, K R Karthik Gowda
Publikováno v:
2022 IEEE International Conference on Data Science and Information System (ICDSIS).
Autor:
R Abhijith, B. J. Santhosh Kumar
Publikováno v:
2021 2nd International Conference for Emerging Technology (INCET).
To Develop a basic level of security to a LAN-based system to prevent attacks that could potentially stop serving requests to other users. such as web-based attacks that could deny the IP to access the resource present in the web server of the host.
Publikováno v:
2017 International Conference on Communication and Signal Processing (ICCSP).
In cryptography, RSA (Rivest-Shamir-Adleman) is a public key cryptosystem. RSA makes use of public key and private key to encrypt and decrypt plaintext. This consecutively can perform mass encryption and decryption operations at a higher speed. It ca
Publikováno v:
2017 International Conference on Communication and Signal Processing (ICCSP).
Image security is an essential part of communication through network. Nowadays the use of network and transmission of images has been widely increased. These images can be attacked by intruders and destroy the quality of the images or modified the im
Publikováno v:
2017 International Conference on Communication and Signal Processing (ICCSP).
Scalability of network with the expanding number of system a data exchange is crucial to permit secure information transmission in the network environment. The sending information or image may defiled by any outsider on the off chance that it is not
Autor:
B. R. Pushpa, B J Santhosh Kumar
Publikováno v:
International Journal of Engineering & Technology. 7:762
A single file on web contains text, images, audio, video and formatting instructions enclosed within a script. Website files are hosted on servers. The Servers “serve” those files to individual users upon request. Anonymous user with minimum user
Publikováno v:
International Journal of Engineering & Technology. 7:2118
Most WebRTC applications can communicate through video and audio and other modes. WebRTC allows browser-to-browser multimedia imparting on the web. The proposed system emphasizes over the core architecture and allied technologies of WebRTC server acc
Autor:
B J Santhosh Kumar, N K Sreelesh
Publikováno v:
International Journal of Engineering & Technology. 7:18
Cloud computing is a revolutionary computing technique, by which computing resources are provided dynamically via Internet is widely popular. Since the most attractive part of cloud computing is computation outsourcing, it is far beyond enough to jus
Autor:
M R Prasad, B J Santhosh Kumar
Publikováno v:
International Journal of Engineering & Technology. 7:83
Online social networks (OSN) have changed the way individuals collaborate and convey to reconnect with old companions, acquaintances and set up new associations with others considering leisure activities, interests, and fellowship circles. Shockingly
Autor:
B J Santhosh Kumar, Kankanala Pujitha
Publikováno v:
International Journal of Engineering & Technology. 7:106
Application uses URL as contribution for Web Application Vulnerabilities recognition. if the length of URL is too long then it will consume more time to scan the URL (Ain Zubaidah et.al 2014).Existing system can notice the web pages but not overall w