Implementation of Clipboard Security Using Cryptographic Techniques

Download Now
Provided by: International Journal of Computer Applications
Topic: Security
Format: PDF
In the present scenario malicious authors are rapidly growing and now other than internet users they are also targeting the loophole in operating system application level security. Transferring data between applications is common user activity. Since data in a clipboard is freely delivered between arbitrary programs capable of using a format of the data, a simple text, a rich text, a picture, and information having a particular format may be delivered between programs capable of using such information.
Download Now

Find By Topic