Upload Code
loading-left
loading loading loading
loading-right

Loading

Profile
No self-introduction
codes (3)
COMM4 Efficient Packet Filtering in Wireless Ad Ho
no vote
Front end: visual basic Intermediate: temporary internet(embedded wings) live Back end: wireless technology(RS 232 protocols)   Wireless ad hoc networks arean emerging technology. These networks are composed of mobile nodes and mayadopt different topologies depending on the nature of the environment.Nevertheless, they are vulnerable to network layer attacks that cannot beneutralized easily. In wired networks, firewalls improve the level of securityby means of packet filtering techniques that determine what traffic is allowed,thereby reducing the impact of such attacks. In this work, we overview therequirements to adapt firewalls to wireless ad hoc networks and highlight theadvantages of the use of filtering techniques based on Bloom filters.                    The project aims the effic
jafaruatit
2016-08-23
0
1
DEVELOPMENT ENCRYPTION -SECURE COMMUNICATION USING
no vote
Encryption is the conversion of datainto a form, called a cipher text that cannot be easily understood byunauthorized people. Decryption is the process of converting encrypted databack into its original form, so it can be understood. The use of encryption/decryption isas old as the art of communication. In wartime, a cipher, often incorrectlycalled a "code," can be employed to keep the enemy from obtaining thecontents of transmissions. (Technically, a code is a means of representing asignal without the intent of keeping it secret; examples are Morse code andASCII.) Simple ciphers include the substitution of letters for numbers, therotation of letters in the alphabet, and the "scrambling" of voicesignals by inverting the
jafaruatit
2016-08-23
1
1
ensuring data storage security in cloud computing
4.0
Abstract - cloud computing is regarded as the architecture of the next generation of IT enterprises. On the contrary, traditional solutions, where it services are under proper physical, logical and personnel control, cloud computing mobile applications and databases to large data centers, may not be able to manage data and services completely trustworthy. This unique feature, however, will cause many new security challenges that are not well understood. In this article, we focus on the data storage security of cloud computing, which has always been an important aspect of service quality. Since ensuring the correctness of users' data in the cloud, we propose an effective and flexible distributed scheme with two prominent features against its predecessors. By using homomorphic token and distributed verification, erasing encoded data, our plan realizes the correctness of vault and error location of data integration, that is, the identification of misbehaving servers. Unlike most previous works, the new plan further supports data blocks for secure and efficient dynamic operation, including data update, deletion and addition. Extensive security and performance analysis shows that the algorithm is efficient and resistant to Byzantine failure, malicious data modification attacks, and even server collusion attacks.
jafaruatit
2016-08-23
1
1
No more~