[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 20, Issue 32011
Publisher:
  • Taylor & Francis, Inc.
  • 325 Chestnut St. Suite 800 Philadelphia, PA
  • United States
ISSN:1939-3555
EISSN:1939-3547
Reflects downloads up to 09 Jan 2025Bibliometrics
Skip Table Of Content Section
article
Security in Cloud Computing: An Analysis of Key Drivers and Constraints
Pages 123–127

In the emerging computing paradigm known as cloud computing, there are significant issues that need to be addressed in order for cloud computing to be adopted as universally as the Internet. Among these issues, the societal and technological issues ...

article
Alternate Approaches to Business Impact Analysis
Pages 128–134

Business impact analysis BIA is an important process that probes into business processes to determine and list critical processes that are vital to keep the business going. It is necessary to understand business environments, gather data and information,...

article
An Efficient Block Encryption Cipher Based on Chaotic Maps for Secure Multimedia Applications
Pages 135–147

This paper presents an efficient chaotic-based block encryption cipher CBBEC, which is a symmetric encryption algorithm designed with the potential of increasing security and improving performance. It is a hybrid mixture from chaos theory and ...

article
Watermarking in Medical Imaging for Security and Authentication
Pages 148–155

Medical image watermarking has been widely recognized as a relevant technique for enhancing data security, image fidelity, authenticity and content verification in the current e-health environment where medical images are stored, retrieved and ...

article
Automated Integrated Examination System: A Security Concern
Pages 156–162

Revolution in information and communication technology ICT has made a remarkable impact on the society. Countries across the world are using ICT to facilitate information dissemination and communication in all areas of education, training, and ...

article
Apple's Leopard Versus Microsoft's Windows XP: Experimental Evaluation of Apple's Leopard Operating System with Windows XP-SP2 under Distributed Denial of Service Security Attacks
Pages 163–172

Apple's iMac computers are promoted by Apple Inc. to be secure, safe, virus free, and fast computers. In this experimental paper, we evaluate the security offered by the iMac with its usual Leopard Operating System, against different Distributed Denial ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.