Sorry, we do not have enough data to show an influence graph for this author.
- Full text PDF available (0)
Journals and Conferences
In this paper, we will discuss Secure Key Management in Cloud Computing. We discuss the basics of what a key is to how it is used in cloud computing. This paper looks at the types and states of a key. It is then followed by the cloud computing model and the overview of Secure Key Management. Data needs to be in plain text or decrypted for processing, and… (More)
Network Technology using Multi-core Processor Architecture can be additional enhanced the security through the development of network risk assessment. Preventing network attacks has become increasingly difficult and time consuming to all who deals in today's network technologies. These days' people are dependents on internet and its integration in our live… (More)