Zobrazeno 1 - 10
of 1 586
pro vyhledávání: '"SSH File Transfer Protocol"'
Autor:
Heejo Lee, Junwon Lee
Publikováno v:
International Journal of Information Security. 21:311-322
An adversary can use SSH communication as a route for information leakage or hacking. Many studies have focused on TCP header analysis to detect encrypted communication. However, SSH detection using TCP header analysis is limited when changing TCP po
Publikováno v:
Journal of University of Shanghai for Science and Technology. 23:77-84
Cloud Computing is used to share data, services, and resources via a network but this system is vulnerable to cyber-attacks by an unauthorized person denying the user privacy and confidentiality. The exponential growth in Information technology espec
Autor:
Jianchen Shan, Cristian Borcea, Narain Gehani, Reza Curtmola, Xiaoning Ding, Nafize R. Paiker
Publikováno v:
IEEE Transactions on Cloud Computing. 8:97-111
With cloud assistance, mobile apps can offload their resource-demanding computation tasks to the cloud. This leads to a scenario where computation tasks in the same program run concurrently on both the mobile device and the cloud. An important challe
Autor:
Devi Afriyantari Puspa Putri
Publikováno v:
International Journal of Advanced Trends in Computer Science and Engineering. 8:3200-3207
Publikováno v:
Symmetry
Volume 13
Issue 11
Symmetry, Vol 13, Iss 2192, p 2192 (2021)
Volume 13
Issue 11
Symmetry, Vol 13, Iss 2192, p 2192 (2021)
Over the last two decades (2000–2020), the Internet has rapidly evolved, resulting in symmetrical and asymmetrical Internet consumption patterns and billions of users worldwide. With the immense rise of the Internet, attacks and malicious behaviors
Publikováno v:
VORTEX@ISSTA
Incorrect cryptographic protocol implementation and malware attacks targeting its runtime may lead to insecure execution even if the protocol design has been proven safe. This research focuses on adapting a runtime-verification-centric trusted execut
Publikováno v:
2021 International Conference on Emerging Smart Computing and Informatics (ESCI).
With recent advances in Cloud computing, information is being contracted by cloud services. Dropbox and Google Drive provide cloud services to users with low-cost storage. Here we present a protection method by encrypting and decrypting the files whi
Autor:
Brendan Choi
Publikováno v:
Introduction to Python Network Automation ISBN: 9781484268056
This chapter is dedicated to Telnet labs using Python’s telnetlib library. You will learn how to use a basic Telnet example to reiterate and convert your tasks performed on the keyboard into Python scripts. Although Telnet is an insecure protocol a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8882e6357c91e244dabdce21db8fc084
https://doi.org/10.1007/978-1-4842-6806-3_13
https://doi.org/10.1007/978-1-4842-6806-3_13
Publikováno v:
E3S Web of Conferences, Vol 273, p 08049 (2021)
The article describes the development of modified encryption protocol based on the El–Gamal cryptoalgorithm. The development of an import–substituting software package for secure file transfer, based on the modified protocol of El–Gamal was mad