Securing Data Communication for Data Driven Applications Using End to End Encryption

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fault Identification using end-to-end data by imperialist competitive algorithm

Faults in computer networks may result in millions of dollars in cost. Faults in a network need to be localized and repaired to keep the health of the network. Fault management systems are used to keep today’s complex networks running without significant cost, either by using active techniques or passive techniques. In this paper, we propose a novel approach based on imperialist competitive alg...

متن کامل

Fault Identification using end-to-end data by imperialist competitive algorithm

Faults in computer networks may result in millions of dollars in cost. Faults in a network need to be localized and repaired to keep the health of the network. Fault management systems are used to keep today’s complex networks running without significant cost, either by using active techniques or passive techniques. In this paper, we propose a novel approach based on imperialist competitive alg...

متن کامل

Interpolation of fuzzy data by using flat end fuzzy splines

In this paper, a new set of spline functions called ``Flat End Fuzzy Spline" is defined to interpolate given fuzzy data. Some important theorems on these splines together with their existence and uniqueness properties are discussed. Then numerical examples are presented to illustrate the differences between of using our spline and other interpolations that have been studied before.

متن کامل

Securing Medical SaaS solutions using a Novel End-to-End Encryption Protocol

E-Health solutions using the Internet provide many benefits for health centers; hosting such solutions in public Cloud Computing environments as Software-as-a-Service becomes increasingly popular. However, the deployment of e-health services in shared environments is restricted due to regulations prohibiting medical data access by illegitimate parties, such as cloud computing intermediaries. A ...

متن کامل

Secure End to End Data Aggregation using Public Key Encryption in Wireless Sensor Network

Wireless Sensor Networks is made of a large number of lowcost and low power sensor nodes that contains strictly limited sensing, computation, as well as communication abilities. Because of resource restricted sensor nodes, it is very important to reduce the amount of data transmission so the average sensor lifespan and also the total bandwidth utilization are generally increased. Data aggregati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science

سال: 2018

ISSN: 2502-4760,2502-4752

DOI: 10.11591/ijeecs.v10.i2.pp756-762