S Bhute, SK Arjaria - International Journal of Advanced …, 2016 - search.proquest.com
This paper proposed an efficient framework for text data security. In this framework the data is totally controlled by the user and the user security is controlled by the cloud server. For …
MK Pehlivanoğlu, N Duru - International Journal of Computer Applications, 2015 - Citeseer
In the communication age, in the daily life people constantly uses communication tools that are e-mail marketing, instant messaging, social networking, search engines, bookmarking …
Security and confidentiality have become very important and continue to grow. In recent years, there have been several cases involving data security, such as the leaking of …
J Singh, B Kumar, A Khatri - 2012 Nirma University …, 2012 - ieeexplore.ieee.org
Cloud Computing is technology for next generation Information and Software enabled work that is capable of changing the software working environment. It is interconnecting the large …
SA Abbas, MQ Mohammed - International Journal of Applied Information …, 2017 - ijais.org
Cloud computing give an impression of being an extremely well known and famous computing technology. Each person is utilizing cloud computing straightforwardly or …
MR Royani, A Wibowo - Jurnal RESTI (Rekayasa Sistem dan …, 2020 - jurnal.iaii.or.id
The development of e-commerce in Indonesia in the last five years has significantly increased the growth for logistics service companies. The Indonesian Logistics and …
L Mishra, A Sharma - International Journal of Computer Applications, 2015 - Citeseer
The growing requirement of system resources, memory requirement and huge space etc. have sprinted up the demand of cloud computing. The ease in the use and dynamic demand …
Problems that commonly occurred in this period were that the sales data for Alisan products in several stores was falsified and there were quite large differences that did not match the …
A Mousa, A Hamad - Int. J. Comput. Sci. Appl., 2006 - staff-old.najah.edu
Abstract Analysis of the effect of different parameters of the RC4 encryption algorithm where examined. Some experimental work was performed to illustrate the performance of this …