Prathuri Jhansi Rani

Learn More
— Data mining applications and techniques are used in many areas as a required knowledge discovery from large data sets. Cloud computing is one of the prevailing models based on IP architecture. Cloud computing is nothing but the delivery of the computing services over the internet to improve the business of many organizations. Cloud systems which can be(More)
Hashing is used as part of IPSec protocol to ensure that the data being sent has not been tampered or corrupted over the virtual private network(VPN). This can be done using SHA1 or MD5. First 96-bits of the message digest of SHA1 or MD5 are used as an authentication field. This paper shows that the Bernoulli keyed hash function can be used to authenticate(More)
  • 1