copSSH is an ssh server and client implementation for windows systems. It is a yet another packaging of portable openssh, cygwin, some popular utilites, plus implementation of some best practices regarding security. You can use COPSSH for remote administration of your systems or gathering remote information in a secure way.
Foldera is the new way to: Communicate with others in context Secure your vital information instantly Access and Manage your applications, teams, activities and information from wherever you are Notify everyone at the same time when something changes Shar
Foldera is the new way to: Communicate with others in context Secure your vital information instantly Access and Manage your applications, teams, activities and information from wherever you are Notify everyone at the same time when something changes Shar
D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella. Proceedings of the 13th USENIX Security Symposium, page 287--302. Berkeley, CA, USA, USENIX Association, (2004)
S. Izmalkov, S. Micali, and M. Lepinski. Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer
Science, 2005., page 585-594. New York, NJ, USA, IEEE Computer Society, (October 2005)
B. Olagbegi, and N. Meghanathan. International journal on applications of graph theory in wireless
ad hoc networks and sensor networks, 2 (2):
1-15(June 2010)
M. Shah, and S. Pathak. IJIRIS:: International Journal of Innovative Research Journal in Information Security, Volume IV (Issue XI):
01-04(November 2017)1. Y Manjula, K B Shivakumar. Enhanced Secure Image Steganography using Double Encryption Algorithms, at International Conference on Computing for Sustainable Global Development IEEE, 2016. 2. Aarti Singh, Manisha Malhotra. Hybrid Two-Tier Framework for Improved Security in Cloud Environment, at International Conference on Computing for Sustainable Global Development IEEE, 2016. 3. Vishwanath Mahalle, Aniket Shahade. Enhancing the data security in cloud by implementing Hybrid (RSA & AES) Encryption Algorithm, International journal of pure & applied research in engineering and technology, 2016. 4. Sakinah Ali Pitchay, Wail Abdo Ali Alhiagem, Farida Ridzuan, Madihah Mohd Saudi. A proposed system concept on Enhancing the Encryption and Decryption Method for Cloud Computing, 17th UKSIM-SMSS International Conference on Modelling and Simulation, 2015. 5. K.Yang, J.Xiaohua. Security for Cloud storage systems, Springer Brief in Computer Science, 2014. 6. C.K Chan, L.M Cheng. Hiding data in images by simple LSB substitution, Pattern Recognition, vol.37, pp. 469-474, 2014. 7. M.S Sutaone,M.V Khandare. Image based Steganography using LSB insertion Technique, IET International Conference, 2008. 8. Prof. Vishwanath S. Mahalle. Implementing RSA encryption algorithm to enhance the data security of cloud in cloud computing, International journal of pure & applied research in engineering and technology, 2013, volume 1(8):220-227, ISSN-2319-507X IJPRET..