Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Saranya, B.
- Current Status of Selected Endemic Species of Kalakad Mundanthurai Tiger Reserve (kMTR), Tamil Nadu
Abstract Views :280 |
PDF Views:3
Authors
Source
Indian Forester, Vol 138, No 9 (2012), Pagination: 793-797Abstract
The reassessment of the status of four endemic species viz. Eugenia singampattiana, Elaeocarpus venustus, Garcinia travancorica and Syzygium gambleanum from Kalakkad Mundanthurai Tiger Reserve (KMTR), Tamil Nadu was conducted based on the IUCN criteria.Keywords
Reassessment, Strict Endemic Species, KMTR- Strobilanthes bolampattianus Bedd. (Acanthaceae) - a Strict Endemic Species Rediscovered from Nilgiri Biosphere Reserve, Western Ghats
Abstract Views :216 |
PDF Views:0
Authors
Affiliations
1 Forest Department, Tamil Nadu, IN
2 Department of Botany, Barathiar University, Coimbatore-641046, IN
3 Department of Botany, Karpagam University, Coimbatore-641021, IN
1 Forest Department, Tamil Nadu, IN
2 Department of Botany, Barathiar University, Coimbatore-641046, IN
3 Department of Botany, Karpagam University, Coimbatore-641021, IN
Source
Indian Forester, Vol 141, No 8 (2015), Pagination: 890-892Abstract
No Abstract.- Secure Data Storage in Cloud with Decentralized Access Control Scheme and Anonymous Authentication
Abstract Views :162 |
PDF Views:2
Authors
Affiliations
1 Department of CSE, Narasu's Sarathy Institute of Technology, Salem, IN
1 Department of CSE, Narasu's Sarathy Institute of Technology, Salem, IN
Source
Wireless Communication, Vol 7, No 3 (2015), Pagination: 107-110Abstract
Our paper proposes a decentralized access control scheme for storing data or file in cloud securely with anonymous authentication. Authenticity of the content will be verified without knowing the user’s identity with the help of attribute based signature. Data will be encrypted under attribute based encryption and it will be decrypted only for users with attributes specified by the access policy using their key. Encryption and decryption keys are provided through decentralized scheme with two or more KDC’s and access control is provided by access control schemes which defines who have access to data.
Keywords
Access Control, Cloud Storage, Attribute Based Encryption, Attribute Based Signature, Decentralized.- Efficiently Design for Cross Layer Optimization Using Handover Scheme in Vehicle Adhoc Networks
Abstract Views :96 |
PDF Views:0
Authors
Affiliations
1 Dept. of MCA, Vel Tech Multitech Dr. Rangarajan Dr. Sakunthala Engineering College, Avadi, Chennai, IN
1 Dept. of MCA, Vel Tech Multitech Dr. Rangarajan Dr. Sakunthala Engineering College, Avadi, Chennai, IN