Media Coverage of this Article
Found additional news media or blog coverage for the article? Please contact us at
submission@sciepub.com
.
More by these Authors
ASP: Advanced Security Protocol for Security and Privacy in Cloud Computing
Shyam Nandan Kumar, Amit Vajpayee
American Journal of Information Systems
,
Vol. 4, No. 2, 2016
, pp 17-31 | Research Article
doi:10.12691/ajis-4-2-1.
Full-Text (PDF)
Full-Text (Epub)
Full-Text (HTML)
A Survey on Secure Cloud: Security and Privacy in Cloud Computing
Shyam Nandan Kumar, Amit Vajpayee
American Journal of Systems and Software
,
Vol. 4, No. 1, 2016
, pp 14-26 | Review Article
doi:10.12691/ajss-4-1-2.
Full-Text (PDF)
Full-Text (Epub)
Full-Text (HTML)
DecenCrypto Cloud: Decentralized Cryptography Technique for Secure Communication over the Clouds
Shyam Nandan Kumar
Journal of Computer Sciences and Applications
,
Vol. 3, No. 3, 2015
, pp 73-78 | Research Article
doi:10.12691/jcsa-3-3-3.
Full-Text (PDF)
Full-Text (Epub)
Full-Text (HTML)
World towards Advance Web Mining: A Review
Shyam Nandan Kumar
American Journal of Systems and Software
,
Vol. 3, No. 2, 2015
, pp 44-61 | Research Article
doi:10.12691/ajss-3-2-3.
Full-Text (PDF)
Full-Text (Epub)
Full-Text (HTML)
Cryptography during Data Sharing and Accessing Over Cloud
Shyam Nandan Kumar
International Transaction of Electrical and Computer Engineers System
,
Vol. 3, No. 1, 2015
, pp 12-18 | Special Issue
doi:10.12691/iteces-3-1-2.
Full-Text (PDF)
Full-Text (Epub)
Full-Text (HTML)
A Proper Approach on DNA Based Computer
Shyam Nandan Kumar
American Journal of Nanomaterials
,
Vol. 3, No. 1, 2015
, pp 1-14 | Research Article
doi:10.12691/ajn-3-1-1.
Full-Text (PDF)
Full-Text (Epub)
Full-Text (HTML)
A New Approach for Traffic Management in Wireless Multimedia Sensor Network
Shyam Nandan Kumar
International Transaction of Electrical and Computer Engineers System
,
Vol. 2, No. 5, 2014
, pp 128-134 | Research Article
doi:10.12691/iteces-2-5-1.
Full-Text (PDF)
Full-Text (Epub)
Full-Text (HTML)
Related keywords
network security
cryptography
decryption
encryption