2017
DOI: 10.18535/ijecs/v6i3.38
|View full text |Cite
|
Sign up to set email alerts
|

Information Security: A Saga of Security Measures

Abstract: In the time of extreme proclivity of users towards internet and its services, it is almost implied to worry for the concerned security of highly confidential information. So, are the available safety trends and the continuous endeavor in this domain towards unfolding new techniques with enhanced features suggest pioneering concerns of the associated parties for preserving the integrity of underlying system(s). Having gone through some of the works available, we can easily gaze at the much talked issues in the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 2 publications
0
1
0
Order By: Relevance
“…Our aim is to focus in widening the working domain of our proposed usage of a data structure that in no way violates the features of doubly linked lists. With our consistent efforts towards creating a balance between communication channels and underlying framework, we also look for possibility(s) for the merger of other data structure(s) [6]. Thus attempting to maintain the essence of authenticated communication and authorised reciprocation, technology(s) always have an open upper end.…”
Section: Pictorial Representationmentioning
confidence: 99%
“…Our aim is to focus in widening the working domain of our proposed usage of a data structure that in no way violates the features of doubly linked lists. With our consistent efforts towards creating a balance between communication channels and underlying framework, we also look for possibility(s) for the merger of other data structure(s) [6]. Thus attempting to maintain the essence of authenticated communication and authorised reciprocation, technology(s) always have an open upper end.…”
Section: Pictorial Representationmentioning
confidence: 99%