Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Parvez Mahmood Khan"'
Publikováno v:
2021 Fourth International Conference on Computational Intelligence and Communication Technologies (CCICT).
The cloud computing is amongst the most trending fields with several lines of research possibilities, driven by cost-benefits offered by cloud adoption to businesses around the globe. Cloud adoption is more pressing than ever before, especially in th
Autor:
M. M. Sufyan Beg, Parvez Mahmood Khan
Publikováno v:
International Journal of Soft Computing and Software Engineering. 2:1-15
It is well known fact that was phrased by famous quality scholar P.B. Crosby that "it is always cheaper to do the job right the first time". However, this statement must be reconsidered with respect to software development projects, because the conce
Publikováno v:
2014 International Conference on Computing for Sustainable Global Development (INDIACom).
Nowadays, it is the time for strategic technology. In the past, IT was only used as a productivity tool to support business. However, today from using IT that have alignment properly to business needs can gain sole competitive advantage. To ensure th
Publikováno v:
2014 International Conference on Computing for Sustainable Global Development (INDIACom).
Information system managers, senior executive and strategic planners are increasingly turning their attention for opportunities for achieving for competitive advantage and effective business value through implementing reliable information Technology
Publikováno v:
Scopus-Elsevier
An efficient S-box with sound cryptographic features is of utmost significance for the development of strong cryptographic system. Designing cryptographically strong S-boxes is a key challenge. This paper put forward a method to synthesize an efficie
Publikováno v:
2014 Fourth International Conference on Advanced Computing & Communication Technologies.
Software Development Projects have been often in news for wrong reasons, on account of project failures, schedule slippages, cost overruns and poor quality of software produced. This paper is the result of an study carried out to address this unpleas
Publikováno v:
Communications in Computer and Information Science ISBN: 9783662449653
SSCC
SSCC
Recently Hussain et al. proposed an image encryption algorithm which has three independent phases: (1) total pixel shuffling performed, in spatial domain, with permutation sequences extracted from chaotic skew tent map, (2) diffusion carried out usin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::43d4658be56295c2133c9caf847011b7
https://doi.org/10.1007/978-3-662-44966-0_16
https://doi.org/10.1007/978-3-662-44966-0_16
Publikováno v:
Communications in Computer and Information Science ISBN: 9783642545245
SNDS
SNDS
The substitution boxes are the only components in most of symmetric encryption systems that induce nonlinearity to provide efficacious data confusion. The cryptographic potency of these systems primarily depends upon the caliber of their S-boxes. Thi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::37bcfdd7e8116c33f6519dfe0a5034ee
https://doi.org/10.1007/978-3-642-54525-2_48
https://doi.org/10.1007/978-3-642-54525-2_48
Autor:
Parvez Mahmood Khan, M. M. S. S. Beg
Publikováno v:
2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT).
Software Development Projects can vary considerably in difficulty, size and type. This has led to evolution and development of many associated project management methodologies and standard SDLC-Models. This paper acknowledges the risks associated wit
Publikováno v:
Viruses (1999-4915). Feb2023, Vol. 15 Issue 2, p278. 48p.