Table of Contents
Vol 4, No 1 (2016)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Articles
Design, Implementation and Performance Analysis of a Distributed Key Encryption System Deployed within a Public Cloud | ||
Erich Rice, Dennis Guster, Laura Lebentritt | ||
Vol 4, No 1 (2016), Pagination: 1-16 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 243 | PDF Views: 0 |
An Experimental Safety Analysis Using FTA for A Ball Position Control System | ||
Kadupukotla Satish Kumar, Panchumarthy Seetha Ramaiah | ||
Vol 4, No 1 (2016), Pagination: 17-23 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 305 | PDF Views: 0 |
Remote Integrity Verification for Multiple Data Copies in Cloud Environments:A Comparative Analysis and Open Research Issues | ||
Ayad Barsoum | ||
Vol 4, No 1 (2016), Pagination: 24-37 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 232 | PDF Views: 0 |
A Zero Knowledge Proof Implementation Using NXP Security Engine | ||
Alexandru Porosanu, Nitesh Lal Narayan | ||
Vol 4, No 1 (2016), Pagination: 38-44 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 296 | PDF Views: 0 |
Cognitive M2M:An Emerging Technique towards Internet of Things | ||
Lincy M. George, K. R. Remesh Babu | ||
Vol 4, No 1 (2016), Pagination: 45-50 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 261 | PDF Views: 0 |