In This paper the current security of various password hashing schemes that are in use today will be investigated through practical proof of concept – GPU based, password hash dump cracking using the power of cloud computing. The focus of this paper is to show the possible use of cloud computing in cracking hash dumps and the way to countermeasures them by using secure hashing algorithm and using complex passwords
Twitter is prone to malicious tweets containing URLs for spam, phishing, and malware distribution. C...
Designed to combat the unhealthy effects of sitting for long periods of time, the wellness companion...
Due to the high occupancy volume of smartphones in mode society, more and more developers join the s...
The number of users who are interested in trading Cryptocurrency is tremendously increasing, however...
We have developed a new approach to annotate the uncertainty information of geospatial data. This fr...
The growth of android applications is causing a threat and a serious issue towards Android’s securit...
Privacy is an important property that is growing harder to keep as people develop new ways to steal ...
A central problem faced in distributed data storage and in peer to peer applications is the efficien...
The advent of cloud computing has led to a new era of computer usage. Networking and physical securi...
Simplifying network security data to the point that it is readily accessible and usable by a wider a...
This thesis introduces a comprehensive approach for making a particular class of embedded processors...
This study examines on developing an application to reduce the number of overweight people worldwid...
The Internet of Things (IoT) is reshaping our world. Soon our world will be based on smart technolog...
The Internet is a global network that uses communication protocols. It is considered the most import...
In the era of globalization, integrated circuit design and manufacturing is spread across different ...
Twitter is prone to malicious tweets containing URLs for spam, phishing, and malware distribution. C...
Designed to combat the unhealthy effects of sitting for long periods of time, the wellness companion...
Due to the high occupancy volume of smartphones in mode society, more and more developers join the s...
The number of users who are interested in trading Cryptocurrency is tremendously increasing, however...
We have developed a new approach to annotate the uncertainty information of geospatial data. This fr...
The growth of android applications is causing a threat and a serious issue towards Android’s securit...
Privacy is an important property that is growing harder to keep as people develop new ways to steal ...
A central problem faced in distributed data storage and in peer to peer applications is the efficien...
The advent of cloud computing has led to a new era of computer usage. Networking and physical securi...
Simplifying network security data to the point that it is readily accessible and usable by a wider a...
This thesis introduces a comprehensive approach for making a particular class of embedded processors...
This study examines on developing an application to reduce the number of overweight people worldwid...
The Internet of Things (IoT) is reshaping our world. Soon our world will be based on smart technolog...
The Internet is a global network that uses communication protocols. It is considered the most import...
In the era of globalization, integrated circuit design and manufacturing is spread across different ...
Twitter is prone to malicious tweets containing URLs for spam, phishing, and malware distribution. C...
Designed to combat the unhealthy effects of sitting for long periods of time, the wellness companion...
Due to the high occupancy volume of smartphones in mode society, more and more developers join the s...