Cloud

Performance Evaluation Using J2ME With Android Over Cloud Services: A Simulation Approach

Download Now Free registration required

Executive Summary

Now-a-days the greatest challenge to the cyber world is security. The authors need more and more security for their unsecured systems because technology is not a constant factor. There are lots of catalysts, can break the security system. Day by day number of hackers is being increased. Existing old methods of security often fails to overcome it. But as an ancient quote says it's true that "Old is Gold", those methods help one to develop a new idea to sort out their problem in situ thus leads them to discover a new horizon. In this paper an attempt has been made to focus on an algorithm of cryptography that was made by using old methodologies.

  • Format: PDF
  • Size: 516.02 KB