Browsing by Subject "cloud computing"
Now showing items 1-2 of 2
-
Analyses, Mitigation and Applications of Secure Hash Algorithms
(North Dakota State University, 2020)Cryptographic hash functions are one of the widely used cryptographic primitives with a purpose to ensure the integrity of the system or data. Hash functions are also utilized in conjunction with digital signatures to ... -
Detecting Insider and Masquerade Attacks by Identifying Malicious User Behavior and Evaluating Trust in Cloud Computing and IoT Devices
(North Dakota State University, 2019)There are a variety of communication mediums or devices for interaction. Users hop from one medium to another frequently. Though the increase in the number of devices brings convenience, it also raises security concerns. ...