Rajdeep Chowdhury, Jenifar Khan, Subham Sengupta, Saswata Dasgupta, S. Datta, Mallika De
{"title":"采用提出的基于时间集成种子的元素生成密码算法的动态引用数据仓库","authors":"Rajdeep Chowdhury, Jenifar Khan, Subham Sengupta, Saswata Dasgupta, S. Datta, Mallika De","doi":"10.1145/2909067.2909094","DOIUrl":null,"url":null,"abstract":"Network Security has become imperative in the contemporary scenario and subsequently an assortment of modus operandi is being espoused to evade it. Network administrators need to adhere with latest advancement in both hardware and software field to prevent user data from malicious intrusions. The formulated paper outlines a cryptographic algorithm based on Time Integrated Seed modus operandi Engendering Elements at bay and focusing on Dynamic Referencing Data Warehouse employing the identical concept amid its functionality. An amalgamation would endow with a proficient and prearranged approach of amassing data with stringent security modus operandi, with effective deployment of all obtainable space. The incorporation of the novel cryptographic algorithm with the Dynamic Referencing Data Warehouse would ensure performance enhancement in course of action. The pertinent employment of the formulated work could be ensured in a variety of organizations where accrual of cosseted data is of extreme enormity, which would include educational organizations, corporate houses, medical establishments, private establishments and so on and so forth.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Dynamic Referencing Data Warehouse Employing Proposed Time Integrated Seed Based Element Engendered Cryptographic Algorithm\",\"authors\":\"Rajdeep Chowdhury, Jenifar Khan, Subham Sengupta, Saswata Dasgupta, S. Datta, Mallika De\",\"doi\":\"10.1145/2909067.2909094\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Network Security has become imperative in the contemporary scenario and subsequently an assortment of modus operandi is being espoused to evade it. Network administrators need to adhere with latest advancement in both hardware and software field to prevent user data from malicious intrusions. The formulated paper outlines a cryptographic algorithm based on Time Integrated Seed modus operandi Engendering Elements at bay and focusing on Dynamic Referencing Data Warehouse employing the identical concept amid its functionality. An amalgamation would endow with a proficient and prearranged approach of amassing data with stringent security modus operandi, with effective deployment of all obtainable space. The incorporation of the novel cryptographic algorithm with the Dynamic Referencing Data Warehouse would ensure performance enhancement in course of action. The pertinent employment of the formulated work could be ensured in a variety of organizations where accrual of cosseted data is of extreme enormity, which would include educational organizations, corporate houses, medical establishments, private establishments and so on and so forth.\",\"PeriodicalId\":371590,\"journal\":{\"name\":\"Women In Research\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-03-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Women In Research\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2909067.2909094\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Women In Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2909067.2909094","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Dynamic Referencing Data Warehouse Employing Proposed Time Integrated Seed Based Element Engendered Cryptographic Algorithm
Network Security has become imperative in the contemporary scenario and subsequently an assortment of modus operandi is being espoused to evade it. Network administrators need to adhere with latest advancement in both hardware and software field to prevent user data from malicious intrusions. The formulated paper outlines a cryptographic algorithm based on Time Integrated Seed modus operandi Engendering Elements at bay and focusing on Dynamic Referencing Data Warehouse employing the identical concept amid its functionality. An amalgamation would endow with a proficient and prearranged approach of amassing data with stringent security modus operandi, with effective deployment of all obtainable space. The incorporation of the novel cryptographic algorithm with the Dynamic Referencing Data Warehouse would ensure performance enhancement in course of action. The pertinent employment of the formulated work could be ensured in a variety of organizations where accrual of cosseted data is of extreme enormity, which would include educational organizations, corporate houses, medical establishments, private establishments and so on and so forth.