Software Metric LOC Data Analysis for Symmetric Key Cryptographic Technique

被引:0
|
作者
Dhanuja, B. [1 ]
Sathiya, G. [1 ]
机构
[1] VIT Univ, Sch Informat Technol & Engn, MS Software Engn, Vellore, Tamil Nadu, India
关键词
component; Software metrics; LOC; Symmetric key; Cryptographic technique;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As IT industries are growing tremendously; it's difficult to keep track of the productivity, quality of the product, to ensure whether the developed application meets user requirements, customer satisfaction, cost, business operations and to analyze whether there are necessary resources to mitigate risk. In such situation, Metrics comes into picture, which is mainly used to measure the degree of given attribute possessed by the system, component or process, which helps in measuring the improvements and to gain efficiency. In this paper, we provide an overview of software metrics in quality and process and project metrics. We also provided a metric data analysis on symmetric key cryptographic technique to analyze LOC values.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Performance Analysis of Symmetric Key Cryptographic Algorithms
    Vyakaranal, Shashidhara
    Kengond, Shivaraj
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2018, : 411 - 415
  • [2] Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software
    Dodis, Yevgeniy
    Luo, Weiliang
    Xu, Shouhuai
    Yung, Moti
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [3] A cost effective symmetric key cryptographic algorithm for small amount of data
    Sarker, Mohammad Zakir Hossain
    Parvez, Shafiul
    Proceedings of the INMIC 2005: 9th International Multitopic Conference - Proceedings, 2005, : 225 - 230
  • [4] Detection and Analysis of Cryptographic Data Inside Software
    Zhao, Ruoxu
    Gu, Dawu
    Li, Juanru
    Yu, Ran
    INFORMATION SECURITY, 2011, 7001 : 182 - 196
  • [5] BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing
    Sohal, Manreet
    Sharma, Sandeep
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (01) : 1417 - 1425
  • [6] A Symmetric Key Cryptographic Technique Based on Frame Rotation of an Even Ordered Square Matrix
    Goswami , Joyita
    Paul, Manas
    INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 1, 2015, 339 : 319 - 328
  • [7] Towards A Scalable Symmetric Key Cryptographic Scheme: Performance Evaluation and Security Analysis
    Kholidy, Hisham A.
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [8] The analysis and implementation of the symmetric key cryptographic algorithm based on the algebraic Paley graphs
    Oumazouz, Zhour
    Karim, Driss
    INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE, 2022, 17 (04): : 1563 - 1567
  • [9] SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHM BASED ON LOGARITHMIC FUNCTION
    Nema, Preksha
    Rizvi, M. A.
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 757 - 762
  • [10] Efficient key management methods for symmetric cryptographic algorithm
    Sreehari, K. N.
    2018 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC 2018), 2018, : 377 - 380