Zobrazeno 1 - 10
of 147
pro vyhledávání: '"Jeyanthi N."'
Autor:
Jayabalan Jayapriya, Jeyanthi N.
Publikováno v:
Cybernetics and Information Technologies, Vol 24, Iss 1, Pp 35-63 (2024)
In today’s world, Electronic Health Records (EHR) are highly segregated and available only within the organization with which the patient is associated. If a patient has to visit another hospital there is no secure way for hospitals to communicate
Externí odkaz:
https://doaj.org/article/82e1a811eebe40d8be8f3b474b9a976d
Autor:
Hena M., Jeyanthi N.
Publikováno v:
Cybernetics and Information Technologies, Vol 21, Iss 4, Pp 119-136 (2021)
Apache Hadoop answers the quest of handling Bigdata for most organizations. It offers distributed storage and data analysis via Hadoop Distributed File System (HDFS) and Map-Reduce frameworks. Hadoop depends on third-party security providers like Ker
Externí odkaz:
https://doaj.org/article/2794db9f85c048ffa1e0fd7f932c895b
Autor:
Sudha K. Swapna, Jeyanthi N.
Publikováno v:
Cybernetics and Information Technologies, Vol 21, Iss 3, Pp 50-72 (2021)
Internet of Things (IoT) is the predominant emerging technology that targets on facilitating interconnection of internet-enabled resources. IoT applications concentrate on automating different tasks that facilitate physical objects to act autonomousl
Externí odkaz:
https://doaj.org/article/b8ddcc09538f4095a269019c37324cc7
Autor:
Prabadevi B., Jeyanthi N.
Publikováno v:
Cybernetics and Information Technologies, Vol 18, Iss 4, Pp 75-93 (2018)
Address Resolution Protocol (ARP) cache poisoning results in numerous attacks. A novel mitigation system for ARP cache poisoning presented here avoids ARP cache poisoning attacks by introducing timestamps and counters in the ARP messages and ARP data
Externí odkaz:
https://doaj.org/article/6eb0e581e9ff4d0b9bd170acf43c1567
The Smart home possesses the capability of facilitating home services to their users with the systematic advance in The Internet of Things (IoT) and information and communication technologies (ICT) in recent decades. The home service offered by the s
Externí odkaz:
http://arxiv.org/abs/2402.00568
Autor:
Prabadevi B., Jeyanthi N.
Publikováno v:
Cybernetics and Information Technologies, Vol 17, Iss 4, Pp 69-86 (2017)
The bridge protocol (Address Resolution Protocol) ARP, integrating Ethernet (Layer 2) and IP protocol (Layer 3) plays a vital role in TCP/IP communication since ARP packet is the first packet generated during any TCP/IP communications and they are th
Externí odkaz:
https://doaj.org/article/ad22de98516b4f28981c3494572ce990
Autor:
Brindha K., Jeyanthi N.
Publikováno v:
Cybernetics and Information Technologies, Vol 17, Iss 3, Pp 128-139 (2017)
In the conventional visual cryptographic scheme, an image is divided into several image shares, which are distributed among the members of a group, and the original image is retrieved by combining the shares of all the members. This secret image beco
Externí odkaz:
https://doaj.org/article/fbcc8102f23d4ffbbb68fc78282ffa4d
Autor:
Brindha K., Jeyanthi N.
Publikováno v:
Cybernetics and Information Technologies, Vol 15, Iss 4, Pp 111-123 (2015)
Security has emerged as the most concerned aspect of cloud computing environment and a prime challenge for the cloud users. The stored data can be retrieved by the user whenever and wherever required. But there is no guarantee that the data stored in
Externí odkaz:
https://doaj.org/article/400e0068644440759f6bba636e74cfc6
Publikováno v:
Cybernetics and Information Technologies, Vol 14, Iss 1, Pp 11-24 (2014)
Voice over Internet Protocol (VoIP) is a family of technologies for the transmission of voice over Internet. Voice is converted into digital signals and transmitted as data packets. The Session Initiation Protocol (SIP) is an IETF protocol for VoIP a
Externí odkaz:
https://doaj.org/article/e9c2ba5b3cf446a395bae699b38df82a