2013 International Conference on Communication Systems and Network Technologies 2013
DOI: 10.1109/csnt.2013.100
|View full text |Cite
|
Sign up to set email alerts
|

Identify Uncertainty of Cyber Crime and Cyber Laws

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…Forced outages occur when generators shut down urgently or due to breakdowns. Scheduled outages involve unit closures for inspection or repair (Sahu & Barve, 2013). Forced outages do not affect scheduled downtime, and the device will return to up-state after repair.…”
Section: Methods Of Analysismentioning
confidence: 99%
“…Forced outages occur when generators shut down urgently or due to breakdowns. Scheduled outages involve unit closures for inspection or repair (Sahu & Barve, 2013). Forced outages do not affect scheduled downtime, and the device will return to up-state after repair.…”
Section: Methods Of Analysismentioning
confidence: 99%
“…This added component increases the complexity of the algorithm, making the analysis of factorizing the Euler's totient much more complex than the traditional algorithm that uses two primes. This method not only reduces the time for generation, but it also has the added benefit of enhancing the algorithm by protecting it from a few attacks, namely timing attack, modulus attack, plaintext attack, ciphertext attack [17]. The shortcoming being, while the suggested modified RSA method is faster than the standard RSA algorithm, especially when considering key generation and decryption phases, but it does not speed up the process of encryption significantly enough, compromising its efficiency a little bit.…”
Section: Related Workmentioning
confidence: 99%
“…As a result, the intruder will struggle to decrypt the data. In the same year, Sahu et al [26] presented a more secure approach than the original by making modulus n private as well.…”
Section: Related Workmentioning
confidence: 99%