EUR 53,50
Anzahl: 4 verfügbar
In den WarenkorbZustand: New. pp. 242.
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Master's Thesis from the year 2014 in the subject Computer Science - IT-Security, Lovely Professional University, Punjab, course: M.Tech (Computer Science and Engineering), language: English, abstract: Currently cloud computing environments have come up with a serious problem known as security which is in terms of Confidentiality of Data, Integrity of the Message and Authenticity of the users (CIA). Since user's personal data is being stored in an unencrypted format on a remote machine operated by third party vendors who provide various services, the impact of user's identity and unauthorized access or disclosure of files are very high. Though we have various techniques and algorithms to protect our data from hackers and intruders still cloud environments are prone to other attacks. In this paper, a novel approach is implemented to protect user's confidential data from third party service providers, and also to make sure that the data is not disclosed to any unauthentic user or the service provider even, in any cloud environments. This approach provides a multi-level security in three aspects: 1) User authentication for 'authorization' to enter the network, 2) Image Sequencing password for 'authentication' wherein it is proved that the identity is original user, and 3) RSA algorithm to encrypt the data further for providing 'data integrity'. Thus this approach provides an overall security to the client's personal data and the major issue of confidentiality, integrity and authenticity is fully solved. Implemented results are represented to illustrate that our approach has a reasonable performance.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 80,90
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: preigu, Osnabrück, Deutschland
Taschenbuch. Zustand: Neu. To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach | Security in Cloud Computing | Ashwin Dhivakar | Taschenbuch | 48 S. | Englisch | 2014 | GRIN Verlag | EAN 9783656651994 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 104,14
Anzahl: 1 verfügbar
In den WarenkorbZustand: Used. pp. 254.
Anbieter: Biblios, Frankfurt am main, HESSE, Deutschland
Zustand: Used. pp. 254.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 130,08
Anzahl: 1 verfügbar
In den WarenkorbZustand: New.
Sprache: Englisch
Verlag: ML Books International - IPS, 2015
ISBN 10: 1632401134 ISBN 13: 9781632401137
Anbieter: moluna, Greven, Deutschland
EUR 90,41
Anzahl: Mehr als 20 verfügbar
In den WarenkorbGebunden. Zustand: New.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 131,81
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book examines the fundamentals of quantum computing and its applications in codebreaking and hacking, as well as strategies and technologies for defending systems against quantum attacks. It brings together leading experts from across academia and industry to provide a comprehensive overview of the impacts of quantum computing on cybersecurity and cryptography. As quantum computers become more powerful and practical in the coming years, they pose a serious threat to current encryption and cybersecurity methods which rely on computational difficulty. The book provides readers with a holistic understanding of the quantum computing landscape and its implications on information security.The chapters cover the foundational concepts of quantum mechanics and key quantum algorithms relevant to cryptography and cybersecurity. Detailed discussions on quantum cryptanalysis, post-quantum cryptography, quantum key distribution, and quantum random number generation equip readers with technical knowledge of quantum-safe cryptosystems. Practical topics such as quantum programming, software tools, and implementation of quantum-resistant solutions in different sectors like finance, healthcare, and the Internet of Things provide actionable insights for organizations. The book concludes with an analysis of collaborative strategies, policies and future research directions to foster innovation in quantum-safe cybersecurity. Overall, this book serves as an essential reference for security professionals, researchers, students, and technology leaders interested in preparing systems and data for the quantum computing era.