Results 11 to 20 of about 70,954 (220)
: Outcome-based education is being practiced across the globe to enhance the employability of the undergraduates by instilling certain domain-specific skills. Evaluation is key in measuring the leaning outcomes of students. Tools such as regular quizzes,
Namratha M, S. S., K. Sainath
semanticscholar +1 more source
Cloud computing is a rapidly expanding field. It allows users to access computer system resources as needed, particularly data storage and computational power, without managing them directly.
Rose Adee, H. Mouratidis
semanticscholar +1 more source
Usability and Security of Arabic Text-based CAPTCHA Using Visual Cryptography
Recently, with the spread of online services involving websites, attackers have the opportunity to expose these services to malicious actions. To protect these services, A Completely Automated Public Turing Test to Tell Computers and Humans Apart ...
Suliman A. Alsuhibany, Meznah Alquraishi
semanticscholar +1 more source
A Hybrid Double Encryption Approach for Enhanced Cloud Data Security in Post-Quantum Cryptography
—Quantum computers and research on quantum computers are increasing due to the efficiency and speed required for critical applications. This scenario also kindles the vitality of data protection needed against threats from quantum computers.
Manjushree C V, N. N
semanticscholar +1 more source
Estimating the Role of Blockchain, Deep Learning and Cryptography algorithms in Cloud Security
Cloud network has become very popular in recent days due to its accessibility merits. The data stored in the cloud environment are accessible by the clients from any location.
H. Andi
semanticscholar +1 more source
A Review Paper on Network Security and Cryptography
Organizations all over the globe create a tremendous quantity of data on a daily basis since the birth of the World Wide Web and the rise of ecommerce apps and social networks.
Mr. Pradeep V+3 more
semanticscholar +1 more source
Cryptography & Network Security
: Cryptography is the practice and study of techniques to secure communication in the presence of adversarial behavior. On the other hand, Network security is the set of rules and configurations designed to protect the integrity, confidentiality, and ...
Madhur Anil Borate+4 more
semanticscholar +1 more source
—Now-a-days, sensitive and confidential information needs to be exchanged over open, public, and not secure networks such as the Internet. For this purpose, some information security techniques combine cryptographic and steganographic algorithms and ...
E. G., Holman Montiel A, F. S.
semanticscholar +1 more source
—Ensuring the security of cloud computing is one of the most critical challenges facing the cloud services sector. Dealing with data in a cloud environment, which uses shared resources, and providing reliable and secure cloud services, requires a robust ...
Hossein Abroshan
semanticscholar +1 more source
A Survey on Blockchain Technology Concepts, Applications and Security
—In the past decade, blockchain technology has become increasingly prevalent in our daily lives. This technology consists of a chain of blocks that contains the history of transactions and information about its users. Distributed digital ledgers are used
Asma M. Alqahtani, Abdulmohsen Algarni
semanticscholar +1 more source