World Journal of Science and Technology

Displaying 1-8 of 8 results

  • White Papers // Jan 2013

    Survey on Security Issues and Data Gathering Protocols in Wireless Sensor Network

    In today's world Wireless Sensor Networks (WSN) has become an emerging technology and day by day it is attracting the attention of researchers with its challenges and wide applications. Security is a major concern for successful WSN. Awareness with the security aspects of WSN is essential before designing WSN system....

    Provided By World Journal of Science and Technology

  • White Papers // Jul 2012

    Distributed Private Key for P2P Network Message Security

    Peer-To-Peer (P2P) networking is a distributed application architecture that partitions tasks or workloads among peers. Peers are equally privileged, equipotent participants in the application. Identity Based Cryptography (IBC) was introduced into peer-to-peer networks recently for identity verification and authentication purposes. The authors present an IBC infrastructure setup phase, a peer...

    Provided By World Journal of Science and Technology

  • White Papers // May 2012

    Security Challenges in the Cloud Computing Environment

    Cloud computing refers to a computing system in which tasks are assigned on service basis over a network. Collection of such connections is called as 'The cloud'. Service can be anything, software, a platform, a storage location, etc. It can also be renting of a server or many servers and...

    Provided By World Journal of Science and Technology

  • White Papers // Apr 2012

    A CRM Service for Cloud Computing Based on a Separate Encryption and Decryption System

    Enterprises usually store data in internal storage and install firewalls to protect against intruders to access the data. They also standardize data access procedures to prevent insiders to disclose the information without permission. In cloud computing, the data will be stored in storage provided by service providers. Service providers must...

    Provided By World Journal of Science and Technology

  • White Papers // Apr 2012

    Cloud Computing, Risks and Rewards

    Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This technology allows for much more efficient computing by centralizing...

    Provided By World Journal of Science and Technology

  • White Papers // Apr 2012

    A Review of Resource Allocation Policies in Cloud Computing

    Cloud computing is on demand as it offers dynamic flexible resource allocation for reliable and guaranteed services in pay-as-you-use manner to public. In cloud computing multiple cloud users can request number of cloud services simultaneously. So there must be a provision that all resources are made available to requesting user...

    Provided By World Journal of Science and Technology

  • White Papers // Mar 2012

    Security Insights on M-Commerce in Adhoc Wireless Network

    In this paper, the authors proposed highlights about the usage of mobile commerce system in the environment of ad-hoc wireless network, which is one of the emerging trends in mobile applications with huge demands. Although many such products has already found its position in the commercial place, but every products...

    Provided By World Journal of Science and Technology

  • White Papers // Oct 2011

    FPGA Based Intrusion Detection

    The Internet is a worldwide system, and the basic services of information security include verification, preserving data integrity. The present Internet architecture has limited support for both securing and identifying shared Internet resources. Recent high profile attacks reveal the importance of defensive systems for computer security. The authors propose a...

    Provided By World Journal of Science and Technology

  • White Papers // Apr 2012

    Cloud Computing, Risks and Rewards

    Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This technology allows for much more efficient computing by centralizing...

    Provided By World Journal of Science and Technology

  • White Papers // May 2012

    Security Challenges in the Cloud Computing Environment

    Cloud computing refers to a computing system in which tasks are assigned on service basis over a network. Collection of such connections is called as 'The cloud'. Service can be anything, software, a platform, a storage location, etc. It can also be renting of a server or many servers and...

    Provided By World Journal of Science and Technology

  • White Papers // Mar 2012

    Security Insights on M-Commerce in Adhoc Wireless Network

    In this paper, the authors proposed highlights about the usage of mobile commerce system in the environment of ad-hoc wireless network, which is one of the emerging trends in mobile applications with huge demands. Although many such products has already found its position in the commercial place, but every products...

    Provided By World Journal of Science and Technology

  • White Papers // Jul 2012

    Distributed Private Key for P2P Network Message Security

    Peer-To-Peer (P2P) networking is a distributed application architecture that partitions tasks or workloads among peers. Peers are equally privileged, equipotent participants in the application. Identity Based Cryptography (IBC) was introduced into peer-to-peer networks recently for identity verification and authentication purposes. The authors present an IBC infrastructure setup phase, a peer...

    Provided By World Journal of Science and Technology

  • White Papers // Apr 2012

    A Review of Resource Allocation Policies in Cloud Computing

    Cloud computing is on demand as it offers dynamic flexible resource allocation for reliable and guaranteed services in pay-as-you-use manner to public. In cloud computing multiple cloud users can request number of cloud services simultaneously. So there must be a provision that all resources are made available to requesting user...

    Provided By World Journal of Science and Technology

  • White Papers // Jan 2013

    Survey on Security Issues and Data Gathering Protocols in Wireless Sensor Network

    In today's world Wireless Sensor Networks (WSN) has become an emerging technology and day by day it is attracting the attention of researchers with its challenges and wide applications. Security is a major concern for successful WSN. Awareness with the security aspects of WSN is essential before designing WSN system....

    Provided By World Journal of Science and Technology

  • White Papers // Apr 2012

    A CRM Service for Cloud Computing Based on a Separate Encryption and Decryption System

    Enterprises usually store data in internal storage and install firewalls to protect against intruders to access the data. They also standardize data access procedures to prevent insiders to disclose the information without permission. In cloud computing, the data will be stored in storage provided by service providers. Service providers must...

    Provided By World Journal of Science and Technology

  • White Papers // Oct 2011

    FPGA Based Intrusion Detection

    The Internet is a worldwide system, and the basic services of information security include verification, preserving data integrity. The present Internet architecture has limited support for both securing and identifying shared Internet resources. Recent high profile attacks reveal the importance of defensive systems for computer security. The authors propose a...

    Provided By World Journal of Science and Technology