Muhammad Raheem

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
This report contains different methods used to provide anonymity in order to provide secrecy. It describes the two broad techniques to achieve Anonymity (Mixes and DC-Nets).The main focus of the report is on the comparison and evaluation of the sub mechanisms involved in the above two techniques and how they actually work to provide anonymity. Additionally,(More)
Linköpings tekniska högskola Institutionen för systemteknik 581 83 Linköping Abstract The widespread use of computer technology for information handling resulted in the need for higher data protection whether stored in memory or communicated over the network. Particularly with the advent of Internet, more and more companies tend to bring their businesses(More)
Yahoo have deployed their cloud services for use. Cloud computing pay-as-you-go model, on demand scaling, and low maintenance cost has attracted many users. The widespread adoption of cloud paradigm upshots various challenges. The legacy data center and cloud architectures are unable to handle the escalating user demands. Therefore, new data center network(More)
  • 1