نتایج جستجو برای: keywords proxy war

تعداد نتایج: 2039825  

2015
Pooja Dubey

During the transmission of data from sender prevents from various attacks. Public key encryption is a technique which provides encryption of data using public key. The existing technique implemented for the searching of keywords with public key encryption provides security from password Guessing attacks [1]. But the technique implemented here enables security from various attacks as fine as als...

2008
Yansong Feng Mirella Lapata

The availability of databases of images labeled with keywords is necessary for developing and evaluating image annotation models. Dataset collection is however a costly and time consuming task. In this paper we exploit the vast resource of images available on the web. We create a database of pictures that are naturally embedded into news articles and propose to use their captions as a proxy for...

Journal: :Proceedings of the American Society for Information Science and Technology 2009

2017
Arshiya Mubeen

Large number of clients like to store data onto public cloud server (PCS) due to increase in advancement in cloud computing. As a result the new security problems are in need to be solved to help large number of clients in processing their data on public cloud servers. When the clients are not allowed to access the public cloud servers, they will be forwarded to proxy servers to process their d...

Journal: :IACR Cryptology ePrint Archive 2015
Bhanu Prakash Gopularam Nalini N

Cloud computing is delivery of services rather than a product and among different cloud deployment models, the public cloud provides improved scalability and cost reduction when compared to others. Security and privacy of data is one of the key factors in transitioning to cloud. Typically the cloud providers have a demilitarized zone protecting the data center along with a reverse proxy setup. ...

2014
Bhanu Prakash Gopularam

Cloud computing is delivery of services rather than a product and among different cloud deployment models, the public cloud provides improved scalability and cost reduction when compared to others. Security and privacy of data is one of the key factors in transitioning to cloud. Typically the cloud providers have a demilitarized zone protecting the data center along with a reverse proxy setup. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید