SODAP: Self-organized topology protection for superpeer P2P networks

PL Snyder, G Valetto - Scalable Computing: Practice and Experience, 2015 - scpe.org
Unstructured superpeer overlays are an approach to peer-to-peer systems that enables
collective organization and ensures the efficient participation and use of divers peers with …

A REVIEW ON CYBER CRIME PREVENTION USING STEGANOGRAPHY

S Sangwan - … Journal for Research Publication and Seminar, 2022 - jrps.shodhsagar.com
This paper is describing the cyber crime with its type. Cyber Crime is a different type of the
crimes that are performed with the use of internet. Such crimes involve a plethora of criminal …

USE OF CRYPTOGRAPHY IN SECURITY ENHANCEMENT FOR PREVENTING CYBER CRIME

S Singh - International Journal for Research Publication and …, 2022 - jrps.shodhsagar.com
The effects of cybercrime have been outlined in this research. The Internet-facilitated
criminal activity. Cybercrime is the term used to describe these forms of wrongdoings …

Session layer security enhancement with md5 and multiplicative inverse cryptographic mechanism

M Agarwal - Asian Journal of Multidimensional Research …, 2020 - indianjournals.com
This paper proposes MD5 and Multiplicative Inverse based Data Encryption Model for
security of data during data transmission. It discusses about Cloud computing mechanism …

A REVIEW ON USE OF STEGANOGRAPHY FOR CYBER CRIME PREVENTION

S Singh - International Journal for Research Publication and …, 2021 - jrps.shodhsagar.com
The many forms of cybercrime are categorized here. Internet-based criminal activity, or"
cyber crime," is distinct from traditional crime. This kind of crime encompasses a wide range …

[图书][B] Modeling and Engineering Self-Organization in Complex Software Systems

PL Snyder - 2013 - search.proquest.com
Describing, understanding, and modeling the emergent behavior of self-organizing software
systems remains an open challenge. Such systems can solve problems in computing …

Session Layer Security Enhancement Using Customized Protocol and Strong Cryptographic Mechanism

A Jain, S Nama - Proceeding of the International Conference on …, 2020 - Springer
Cloud computing has been considered as a mechanism to deliver information technology
services. Data security is significant aspect of Internet for enterprises of each size and type …

[PDF][PDF] Design and implementation of a security model for the PeerSpace. NET

L Bitter - 2015 - scholar.archive.org
The users of space-based applications are decoupled from each other in time and space
because they interact with each other by writing and reading/taking objects to/from the …