Securing Data Communication for Data Driven Applications Using End to End Encryption
نویسندگان
چکیده
منابع مشابه
Fault Identification using end-to-end data by imperialist competitive algorithm
Faults in computer networks may result in millions of dollars in cost. Faults in a network need to be localized and repaired to keep the health of the network. Fault management systems are used to keep today’s complex networks running without significant cost, either by using active techniques or passive techniques. In this paper, we propose a novel approach based on imperialist competitive alg...
متن کاملFault Identification using end-to-end data by imperialist competitive algorithm
Faults in computer networks may result in millions of dollars in cost. Faults in a network need to be localized and repaired to keep the health of the network. Fault management systems are used to keep today’s complex networks running without significant cost, either by using active techniques or passive techniques. In this paper, we propose a novel approach based on imperialist competitive alg...
متن کاملInterpolation of fuzzy data by using flat end fuzzy splines
In this paper, a new set of spline functions called ``Flat End Fuzzy Spline" is defined to interpolate given fuzzy data. Some important theorems on these splines together with their existence and uniqueness properties are discussed. Then numerical examples are presented to illustrate the differences between of using our spline and other interpolations that have been studied before.
متن کاملSecuring Medical SaaS solutions using a Novel End-to-End Encryption Protocol
E-Health solutions using the Internet provide many benefits for health centers; hosting such solutions in public Cloud Computing environments as Software-as-a-Service becomes increasingly popular. However, the deployment of e-health services in shared environments is restricted due to regulations prohibiting medical data access by illegitimate parties, such as cloud computing intermediaries. A ...
متن کاملSecure End to End Data Aggregation using Public Key Encryption in Wireless Sensor Network
Wireless Sensor Networks is made of a large number of lowcost and low power sensor nodes that contains strictly limited sensing, computation, as well as communication abilities. Because of resource restricted sensor nodes, it is very important to reduce the amount of data transmission so the average sensor lifespan and also the total bandwidth utilization are generally increased. Data aggregati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science
سال: 2018
ISSN: 2502-4760,2502-4752
DOI: 10.11591/ijeecs.v10.i2.pp756-762