Secure File Storage On Cloud Using Hybrid Cryptography seminar
Hybrid Cryptography concept is used for securing storage system of cloud. Two different approaches are used to show the difference between less secure and more secure systems. The first approach uses RSA and AES algorithms; RSA is used for key encryption and AES is used for text or data encryption Secure File Storage on Cloud […]
Secure File Storage On Cloud Using Hybrid Cryptography
Secure File Storage allows Premium users to keep important documents at their fingertips, without having to worry about losing them or someone getting unwanted access to them. … Wherever you have access to your devices, you now have access to those files. Microsoft OneDrive is one of our top picks for the most secure cloud […]
fake image detection 2021
Due to the significant advancements in image processing and machine learning algorithms, it is much easier to create, edit, and produce high quality images. However, attackers can maliciously use these tools to create legitimate looking but fake images to harm others, bypass image detection algorithms, or fool image recognition classifiers. In this work, we propose […]
ml cyber security
machine learning Deep learning methods for cyber security Machine learning has become a vital technology for cybersecurity. Machine learning preemptively stamps out cyber threats and bolsters security infrastructure through pattern detection, real-time cyber crime mapping and thorough penetration testing. Artificial intelligence techniques can be used to learn how to remove noise or unwanted data and […]
digital privacy
Digital privacy is often used in contexts that promote advocacy on behalf of individual and consumer privacy rights in e-services and is typically used in opposition to the business practices of many e-marketers, businesses, and companies to collect and use such information and data. Privacy relates to any rights you have to control your personal […]
fog computing 2021
Fog computing or fog networking, also known as fogging, is an architecture that uses edge devices to carry out a substantial amount of computation, storage, and communication locally and routed over the Internet backbone Fog computing is a decentralized computing infrastructure in which data, compute, storage and applications are located somewhere between the data source […]
cache memory
a supplementary memory system that temporarily stores frequently used instructions and data for quicker processing by the central processor of a computer. The cache augments, and is an extension of, a computer’s main memory direct-mapped cache; fully associative cache; N-way-set-associative cache. Cache memory is important because it improves the efficiency of data retrieval. It stores […]
bankers algorithm
The banker’s algorithm is a resource allocation and deadlock avoidance algorithm that tests for safety by simulating the allocation for predetermined maximum possible amounts of all resources, then makes an “s-state” check to test for possible activities, before deciding whether allocation should be allowed to continue Banker’s Algorithm is used in the banking system to […]
cryptography cyber security
Cryptography refers to the technique or practice of securing data and communications. Cybersecurity experts use cryptography to design algorithms, ciphers, and other security measures that codify and protect company and customer data. To work in cryptography, individuals must possess the following: Programming skills. Cybersecurity and cryptography are separate entities but are still connected. Cybersecurity refers […]
error correction interleaved memories
Error correction code memory (ECC memory) is a type of computer data storage that uses an error correction code[a] (ECC) to detect and correct n-bit data corruption which occurs in memory. ECC memory is used in most computers where data corruption cannot be tolerated under any circumstances, like industrial control applications, critical databases, and infrastructural […]