Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Mohammad Reza Abbasy"'
Publikováno v:
2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT).
Although, using cloud-based services is increasing nowadays, but for many sensitive applications, users need to ensure that the processes are performing correctly in the cloud. In this paper, we propose a scalable method for remote attestation of dis
Publikováno v:
International Journal of Information and Electronics Engineering.
vulnerabilities every time had been a crucial and lasting so far. So what is the trustable and feasible approach for the purpose of manifesting objectives? Developing file system with cryptographic features can promote liabilities. The Cryptographic
Publikováno v:
SERVICES
The main target of this paper is to propose an algorithm to implement data hiding in DNA sequences to increase the confidentiality and complexity by using software point of view in cloud computing environments. By utilizing some interesting features
Autor:
Mohammad Reza Najaf Torkaman, Ali Ordi, Mohammad Reza Abbasy, Hamid Mousavi, Bharanidharan Shanmugam
Publikováno v:
Communications in Computer and Information Science ISBN: 9783642219832
DICTAP (1)
DICTAP (1)
One of the most common types of denial of service attack on 802.11 based networks is resource depletion at AP side. APs meet such a problem through receiving flood probe or authentication requests which are forwarded by attackers whose aim are to mak
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ec55c5f24a497675c5e68d2de8f8b004
https://doi.org/10.1007/978-3-642-21984-9_43
https://doi.org/10.1007/978-3-642-21984-9_43
Autor:
Mohammad Reza Najaf Torkaman, S. Farzaneh Tabatabaiee, Mohammad Reza Abbasy, Nazanin Sadat Kazazi, Pourya Nikfard
Publikováno v:
Communications in Computer and Information Science ISBN: 9783642226021
DEIS
DEIS
There exists a big demand for secure electronic communications while the expertise level of attackers increases rapidly and that causes even bigger demands and needs for an extreme secure connection. An ideal security protocol should always be protec
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b087150e0431f1a88883181ef17f0fb6
https://doi.org/10.1007/978-3-642-22603-8_4
https://doi.org/10.1007/978-3-642-22603-8_4
Publikováno v:
Communications in Computer and Information Science ISBN: 9783642226021
DEIS
DEIS
The main target of this paper is to propose an algorithm to implement data hiding in DNA sequences to increase the complexity by using software point of view. By utilizing some interesting features of DNA sequences, the implementation of a data hidin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::38319c4a076c6a80030bcd2488ff83ef
https://doi.org/10.1007/978-3-642-22603-8_5
https://doi.org/10.1007/978-3-642-22603-8_5