Zobrazeno 1 - 10
of 104
pro vyhledávání: '"Chittaranjan Hota"'
Publikováno v:
Future Internet, Vol 15, Iss 4, p 146 (2023)
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest
Externí odkaz:
https://doaj.org/article/f0497ab8aeba411da7fa2da2778b52ce
Publikováno v:
Computer Communications. 202:110-123
Autor:
Anirudh Kasturi, Chittaranjan Hota
Publikováno v:
The Journal of Supercomputing.
Publikováno v:
2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM).
Autor:
Manisha Malani, Anirudh Kasturi, Md. Moinul, Shovanlal Gayen, Chittaranjan Hota, Jayabalan Nirmal
Publikováno v:
Biomedical Applications and Toxicity of Nanomaterials ISBN: 9789811978333
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8fdd684ad19d40ef962c3278e84982a7
https://doi.org/10.1007/978-981-19-7834-0_22
https://doi.org/10.1007/978-981-19-7834-0_22
Publikováno v:
2022 IEEE Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI).
Autor:
Soumya Prakash Otta, Siddharth Kolipara, Vijay Kumar Malhotra, Aman Raj Singh, Subhrakanta Panda, Chittaranjan Hota
Publikováno v:
2022 5th International Conference on Computational Intelligence and Networks (CINE).
Publikováno v:
IEEE Wireless Communications Letters. 10:2412-2416
5G micro infrastructure comprising micro and picocells would play a pivotal role in densifying the network to provide ample coverage. However, a disproportional association of mobile devices with these small cells would cause hotspots and load imbala
Publikováno v:
Information Security Journal: A Global Perspective. 31:226-236
This paper addresses the challenges of building a secure software system to prevent Man-at-the-End attacks. Ensuring the security of systems is challenging due to unfavorable constraints faced by t...
Autor:
Chittaranjan Hota, Rajesh Shrivastava
Publikováno v:
Information Systems Frontiers. 23:915-930
Programs are developed in a manner so that they execute and fulfill their intended purpose. In doing so, programmers trust the language to help them achieve their goals. Binary hardening is one such concept that prevents program behavior deviation an