|
|
|
Soumya Prakash Otta, Subhrakanta Panda, Maanak Gupta and Chittaranjan Hota
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest num...
ver más
|
|
|
|
|
|
|
Rohit Srivastava, Ravi Tomar, Maanak Gupta, Anuj Kumar Yadav and Jaehong Park
In today?s scenario, image watermarking has been an integral part in various multimedia applications. Watermarking is the approach for adding additional information to the existing image to protect the data from modification and to provide data integrity...
ver más
|
|
|
|
|
|
|
Jonathan Ebert, Ohad Newton, Jeffery O?Rear, Scott Riley, Jaehong Park and Maanak Gupta
The rapidly developing technology and lack of standards in the transportation industry for the proposed Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), and Vehicle-to-Everything (V2X) networks, which all vehicles will operate under, drives con...
ver más
|
|
|
|