Current Issue


A Study of Cloud Computing Performance and Security using Full Harmonic Encryption Method

Farhan Nisar

https://doi.org/10.6025/jisr/2025/16/3/85-97

Abstract Cloud Computing mean the relationship between many computer users across through a get in touch relation with other users like internet. In Cloud Computing we transmit and receive data from the internet. Cloud Computing give the liberty to Cloud Provider gives the opportunity to their user to use service as per pay model. Now days, in Cloud Performance and Security of data are... Read More


Algorithms and Methods for Detection of Phishing Website: A Review

Arun Kumar R, Vaishnavi H, Anusha S, Nausheen K, Apeksha P

https://doi.org/10.6025/jisr/2025/16/3/98-109

Abstract Phishing websites pose a serious threat, prompting the use of machine learning for detection. Researchers employ algorithms like XGBoost, Gradient Boosting, Adaboost, SVM, and Random Forest, trained on datasets to discern patterns distinguishing phishing from legitimate sites. Feature extraction analyzes URL structure, domain age, and content, while deep learning automates this process, identifying complex patterns. These techniques exhibit high accuracy, surpassing rule-based methods. Ongoing... Read More


Only 3-way Handshake Pake based on Reversible Cellular Automata

Soufiane Baghor, Kamel Mohamed Faraoun

https://doi.org/10.6025/jisr/2025/16/3/110-124

Abstract In this paper, we propose an only three way handshake password authenticated key exchange using only the mechanism of two-dimensional reversible cellular automata. The scheme use simple and elementary operations to handle the problem of mutual authentication between two communicating parties, and establish common secure, valid session key based only on a short, easily memorable password. Security of the proposed scheme shown to be... Read More


Copyright © 2014 dline.info