Please use this identifier to cite or link to this item:
http://www.ir.juit.ac.in:8080/jspui/jspui/handle/123456789/11422Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Karn, Shivam | - |
| dc.contributor.author | Taneja, Aradhya | - |
| dc.contributor.author | Modi, Praveen [Guided by] | - |
| dc.date.accessioned | 2024-08-07T05:38:51Z | - |
| dc.date.available | 2024-08-07T05:38:51Z | - |
| dc.date.issued | 2024 | - |
| dc.identifier.uri | http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/11422 | - |
| dc.description | SP2024066 [Enrollment No. 201297, 201270] | en_US |
| dc.language.iso | en_US | en_US |
| dc.publisher | Jaypee University of Information Technology, Solan, H.P. | en_US |
| dc.subject | Lockstash | en_US |
| dc.subject | Encryption | en_US |
| dc.subject | Decryption | en_US |
| dc.subject | Hashing | en_US |
| dc.title | Lockstash: Accessing Data VIA Secure Storage System | en_US |
| dc.type | Project Report | en_US |
| Appears in Collections: | B.Tech. Project Reports | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| Lockstash Accessing Data VIA Secure Storage System.pdf | 3.28 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.