Data deduplication using distributed storage hash algorithm with elliptic curve cryptography based data hiding and enhanced fuzzy based intrusion detection framework
| dc.contributor.guide | A Kangaiammal | |
| dc.coverage.spatial | ||
| dc.creator.researcher | S Hema | |
| dc.date.accessioned | 2024-04-15T11:15:24Z | |
| dc.date.available | 2024-04-15T11:15:24Z | |
| dc.date.awarded | 2024 | |
| dc.date.completed | 2022 | |
| dc.date.registered | 2015 | |
| dc.description.abstract | newline | |
| dc.description.note | 5022 | |
| dc.format.accompanyingmaterial | DVD | |
| dc.format.dimensions | 92mm | |
| dc.format.extent | ||
| dc.identifier.uri | http://hdl.handle.net/10603/557739 | |
| dc.language | English | |
| dc.publisher.institution | Department of Computer Science | |
| dc.publisher.place | Salem | |
| dc.publisher.university | Periyar University | |
| dc.relation | ||
| dc.rights | university | |
| dc.source.university | University | |
| dc.subject.keyword | Data deduplication using distributed storage hash algorithm | |
| dc.subject.keyword | elliptic curve cryptography based data hiding | |
| dc.subject.keyword | fuzzy based intrusion detection framework | |
| dc.title | Data deduplication using distributed storage hash algorithm with elliptic curve cryptography based data hiding and enhanced fuzzy based intrusion detection framework | |
| dc.title.alternative | ||
| dc.type.degree | Ph.D. |
Files
Original bundle
1 - 5 of 11
Loading...
- Name:
- 10_annexure.pdf
- Size:
- 49.12 KB
- Format:
- Adobe Portable Document Format
- Description:
- Attached File
Loading...
- Name:
- 2_preliminary pages.pdf
- Size:
- 206.51 KB
- Format:
- Adobe Portable Document Format
License bundle
1 - 1 of 1