Software Metric LOC Data Analysis for Symmetric Key Cryptographic Technique

被引:0
|
作者
Dhanuja, B. [1 ]
Sathiya, G. [1 ]
机构
[1] VIT Univ, Sch Informat Technol & Engn, MS Software Engn, Vellore, Tamil Nadu, India
关键词
component; Software metrics; LOC; Symmetric key; Cryptographic technique;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As IT industries are growing tremendously; it's difficult to keep track of the productivity, quality of the product, to ensure whether the developed application meets user requirements, customer satisfaction, cost, business operations and to analyze whether there are necessary resources to mitigate risk. In such situation, Metrics comes into picture, which is mainly used to measure the degree of given attribute possessed by the system, component or process, which helps in measuring the improvements and to gain efficiency. In this paper, we provide an overview of software metrics in quality and process and project metrics. We also provided a metric data analysis on symmetric key cryptographic technique to analyze LOC values.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] A Generic Security API for Symmetric Key Management on Cryptographic Devices
    Cortier, Veronique
    Steel, Graham
    COMPUTER SECURITY - ESORICS 2009, PROCEEDINGS, 2009, 5789 : 605 - +
  • [22] Modern techniques for decentralized key establishment in symmetric cryptographic systems
    Galis, Meiran
    Unkasevic, Tomislav
    Milosavljevic, Milan
    Banjac, Zoran
    Milosav, Predrag
    2021 29TH TELECOMMUNICATIONS FORUM (TELFOR), 2021,
  • [23] Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra
    Lipinski, Z.
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2021, 32 (01) : 81 - 96
  • [24] A generic security API for symmetric key management on cryptographic devices
    Cortier, Veronique
    Steel, Graham
    INFORMATION AND COMPUTATION, 2014, 238 : 208 - 232
  • [25] A symmetric neural cryptographic key generation scheme for Iot security
    Arindam Sarkar
    Applied Intelligence, 2023, 53 : 9344 - 9367
  • [26] A Symmetric Key Cryptographic Encryption Technique of MPEG Digital Video Images Based on RGB Pixel Transposition and Shuffling
    Kester, Quist-Aphetsi
    Nana, Laurent
    Pascu, Anca Christine
    Gire, Sophie
    Eghan, Jojo M.
    Quaynor, Nii Narku
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2015, 10 (04): : 192 - 199
  • [27] An Effective Data Security Mechanism for Secured Data Communications Using Hybrid Cryptographic Technique and Quantum Key Distribution
    Jananya Sivakumar
    Sannasi Ganapathy
    Wireless Personal Communications, 2023, 133 : 1373 - 1396
  • [28] An Effective Data Security Mechanism for Secured Data Communications Using Hybrid Cryptographic Technique and Quantum Key Distribution
    Sivakumar, Jananya
    Ganapathy, Sannasi
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 133 (03) : 1829 - 1856
  • [29] Reliability Analysis for Cryptographic Key Management
    Xiao, Sheng
    Gong, Weibo
    Towsley, Don
    Zhang, Qingquan
    Zhu, Ting
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 999 - 1004
  • [30] A software fault tree key node metric
    Needham, D. M.
    Jones, S. A.
    JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (09) : 1530 - 1540