全部文献期刊学位论文会议报纸专利标准年鉴图书|学者科研项目
中外文文献  中文文献  外文文献
作者:... P. Santhi Thilagam , Amit Praseed , Alwyn R. Pais
来源:[J].Journal of Network and Computer Applications(IF 1.467), 2018, Vol.109, pp.89-109Elsevier
摘要:Abstract(#br)Web applications are subject to attacks by malicious users owing to the fact that the applications are implemented by software developers with insufficient knowledge about secure programming. The implementation flaws arising due to insecure coding practices allow att...
作者:... Furqan Ahmed Khan , P. Santhi Thilagam , Alwyn R. Pais
来源:[J].The Journal of Systems & Software(IF 1.135), 2016, Vol.122, pp.93-109Elsevier
摘要:Abstract(#br)Database-driven web applications today are XML-based as they handle highly diverse information and favor integration of data with other applications. Web applications have become the most popular way to deliver essential services to customers, and the increasing depe...
作者:Alwyn R. Pais , Shankar Joshi
来源:[J].International Journal of Information Security(IF 0.48), 2010, Vol.9 (4), pp.275-286Springer
摘要:Abstract(#br)The Logical Key Hierarchy (LKH) is the most widely used protocol in multicast group rekeying. LKH maintains a balanced tree that provide uniform cost of O ( log N ) for compromise recovery, where N is group size. However, it does not distinguish the behavior of group...
作者:Basappa B. Kodada , Gaurav Prasad , Alwyn R. Pais
来源:[J].International Journal of Computer Network and Information Security(IJCNIS), 2012, Vol.4 (7), pp.12-18MECS
摘要:In the past decades, focus of computation has shifted to high performance computing like Grid Computing and Cloud Computing. In Grid computing, grid server is responsible for managing the all resources like processor, memory and CPU cycles. Grids are basically networks that pool ...
作者:Saurabh Samanta , Radhesh Mohandas , Alwyn R. Pais
来源:[J].International Journal of Electronic Commerce Studies, 2012, Vol.3 (1), pp.45-60Airiti
摘要:Short Message Service (SMS) has become an extension of our lives and plays an important role in daily chores. SMS is a popular medium for delivering Value Added Services and are suitable for mobile banking, payment reminders, SOS calls, stock and news alerts, railway and flight e...
作者:Nikhil C. Mhala , Rashid Jamal , Alwyn R. Pais
来源:[J].IET Image Processing, 2018, Vol.12 (3), pp.422-431IET
摘要:Randomised visual secret sharing is an encryption technique that utilises block-based progressive visual secret sharing and discrete cosine transform (DCT) based reversible data embedding technique to recover a secret image. The recovery method is based on progressive visual...
作者:Alok Kumar , Neha Bansal , Alwyn R. Pais
来源:[J].IET Communications, 2019, Vol.13 (7), pp.892-897IET
摘要:Key pre-distribution in wireless sensor networks is an important area of research due to limited resource availability in sensor nodes. In this study, the authors propose a novel key pre-distribution scheme for wireless sensor networks based on combinatorial design. The proposed ...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×