A Conceptual Model Using The Elliptic Curve Diffie–Hellman With An Artificial Neural Network Over Cloud Computing
Cryptography makes taking a cipher and duplicating the original plain content difficult without the comparing key. With all-around outlined cryptography, messages are scrambled in a manner that savage power assaults against the calculation or the key are everything except unthinkable. A solid crypto...
Main Authors: | Jaber, Aws Naser, Mohamad Fadli, Zolkipli, Othman, Hanshal |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
Universiti Malaysia Pahang
2016
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/15820/ http://umpir.ump.edu.my/id/eprint/15820/ http://umpir.ump.edu.my/id/eprint/15820/1/P073%20pg534-540.pdf |
Similar Items
-
Hypervisor IDPS: DDoS Prevention Tool for Cloud Computing
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017) -
Trusting Cloud Computing for Personal Files
by: Mazlina, Abdul Majid, et al.
Published: (2014) -
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014) -
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017) -
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)