Zobrazeno 1 - 10
of 57
pro vyhledávání: '"Vinjamuri, Janaki"'
Autor:
Aljawarneh, Shadi A., Vangipuram, Radhakrishna, Puligadda, Veereswara Kumar, Vinjamuri, Janaki
Publikováno v:
In Future Generation Computer Systems September 2017 74:430-443
Publikováno v:
Journal of Data and Information Quality. 13:1-8
Autor:
Nimmala Mangathayaru, Padmaja Rani, Vinjamuri Janaki, Kalyanapu Srinivas, B. Mathura Bai, G. Sai Mohan, B. Lalith Bharadwaj
Publikováno v:
Computers, Materials & Continua. 69:2425-2443
Publikováno v:
Recent Advances in Computer Science and Communications. 13:482-490
Background:Distributed Denial of Service (DDoS) attack is a major threat over the internet. The IP traceback mechanism defends against DDoS attacks by tracing the path traversed by attack packets. The existing traceback techniques proposed till now a
Publikováno v:
International Journal of Information Technology and Web Engineering. 14:1-18
In this research, the authors propose a novel tree structure called GANDIVA which computes true supports of all temporal itemsets by performing a tree-based scan and eliminating the database scan which is required for SPAMINE, G-SPAMINE, MASTER, and
Autor:
K. Sharmila, Vinjamuri Janaki
Publikováno v:
Materials Today: Proceedings.
Authentication is the process of recognizing a person based on his credentials. As human beings maintain social relationships and depend on trust since the evolution of mankind, authentication is possible by his physical and biological characteristic
Publikováno v:
Materials Today: Proceedings.
In asymmetric cryptography, public key of an authenticated user is accessible to remaining authenticated users in a communication network. Consequently, an ill minded user can avail and modify public key of a legal user. Therefore, it results the pro
Publikováno v:
Materials Today: Proceedings.
Image based cryptography is the new area in the information technology environment, which is used in development of securing information algorithms. Most of the proposed crypto methods depend on the key in their procedures. Therefore, a key has its o
Publikováno v:
Communications in Computer and Information Science ISBN: 9789811636523
Cryptography is a mechanism used for protection of valuable information from unacceptable users in the networking world. It’s a challenging task to protect such assets from illegal users. This necessitated for the development of Cryptographic techn
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4e5b1730b11cab5f4e26074bad1aef72
https://doi.org/10.1007/978-981-16-3653-0_21
https://doi.org/10.1007/978-981-16-3653-0_21