Zobrazeno 1 - 10
of 30
pro vyhledávání: '"Sijjad Ali"'
Publikováno v:
Egyptian Informatics Journal, Vol 27, Iss , Pp 100519- (2024)
Cloud computing security and data protection are becoming increasingly critical as its use increases. The research we present demonstrates how undercover sharing techniques and homomorphic encryption can be combined to protect private information in
Externí odkaz:
https://doaj.org/article/c9bbdd43c0a34ed4a53f11f1e8bec93a
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 35, Iss 9, Pp 101784- (2023)
We present a method to increase the dependability of cloud-based applications. Traditional Secret Sharing Schemes (SSSs) typically fail to counter the challenges brought on by Private Channel Cracking (PCC) and Illegal Participant (IP) attacks. To pr
Externí odkaz:
https://doaj.org/article/e67a0b8e788447dea7f034a4c9ae99d7
Traditional threshold secret sharing cannot realizing all access structures of secret sharing. So, Ito introduced the concept of Secret sharing scheme realizing general access structure. But Its scheme has to send multiple shares to each trustee. In
Externí odkaz:
http://arxiv.org/abs/1905.02004
Autor:
Panhwar, Muhammad Aamir1 maamirpanhwar@gmail.com, Khuhro, Sijjad Ali2, Mazhar, Tehseen3, Deng ZhongLiang1, Qadir, Nabeel3
Publikováno v:
International Journal of Mathematics & Computer Science. 2021, Vol. 16 Issue 1, p9-21. 13p.
Autor:
Zulfiqar Ali, Noor-ul-Ain, Kamran Ali Memon, Deng Zhong Liang, Muhammad Aashed Khan Abbasi, Muhammad Aamir Panhwar, Sijjad Ali Khuhro
Publikováno v:
Journal of Ambient Intelligence and Humanized Computing. 12:8069-8081
With the recent technological innovations for measuring the physiological characteristics in the human body, Wireless Body Area Networks (WBANs) have received much attention from the industry and academics. One of the feasible solutions provided by t
Autor:
Kamran Ali Memon, Noor ul Ain, Masnizah Mohd, Kamlesh Kumar Soothar, Muhammad Aamir Panhwar, Nasrallah Pirzada, Sijjad Ali Khuhro
Publikováno v:
Indian Journal of Science and Technology. 13:2062-2072
Objectives: Cloud computing technology is in continuous development, and with numerous challenges regarding security. In this context, one of the main concerns for cloud computing is represented by the trustworthiness of cloud services in the Pakista
Autor:
Nabeel Qadir, Mughal E Azam Bilal, Sijjad Ali Khuhro, Deng Zhongliang, Muhammad Aamir Panhwar lowast, Tehseen Mazhar
Publikováno v:
Indian Journal of Science and Technology. 13:1821-1829
Background/Objectives: Light Fidelity is popularly known as Li-Fi. This is a most recent technology that was driven by German physicist Harald Haas(1) in 2011. The technology was proposed during a global talk on Technology Entertainment Design on VLC
Autor:
Nabeel Qadir, Tehseen Mazhar, Deng Zhong Liang, Sijjad Ali Khuhro, Muhammad Aamir Panhwar, Mughal E Azam Bilal
Publikováno v:
Indian Journal of Science and Technology. 13:1423-1434
Objectives: Cloud offers multiple benefits through its data center-based services. The whole world uses these services that are hosted by physical machines. Millions of virtual machines get an optimized utilization of hardware to utilize these physic
Autor:
Pervaiz Ahmed, Kamran Ali Memon, Sijjad Ali Khuhro, Muhammad Aamir Panhwar, Saleemullah Memon, China Telecommunications
Publikováno v:
Indian Journal of Science and Technology. 12:1-14
Publikováno v:
Mathematical and Computational Applications, Vol 22, Iss 4, p 45 (2017)
The success of data transaction in a company largely depends on the intelligence system used in its database and application system. The complex and heterogeneous data in the log file make it more difficult for users to manage data effectively. There
Externí odkaz:
https://doaj.org/article/49e44f66fb3f4288b6d7e9db92ebc046