Data Structures - A Comparative Analysis and Application in Cyber Security
Keywords:
Data handling, efficient, organized, data organization, cyber securityAbstract
Data handling in C is a pre-ordained part of programs. Computer programs often process data, so we require competent ways in which we can access or deploy data. In order to do this, we use a structure called “data structure". Data Structure is a data organization, management, and storage system that enables efficient access and amendment. Data Structures being the mainstay of every software, a good expertise over the subject is essential for all software applications under the field of cyber security. Data Structures is about interpreting data elements in terms of some association, for better organization and storage. In this paper, we'll be drawing a contrast of the various data structures that are used in the C programming language and quoting its applications in cyber security. Doing so will give us a perception on how to capitalize on the performance of a program.
References
- Patel, Mayank. Data Structure and Algorithm With C. Educreation Publishing, 2018.
- Bachman, Charles W. "Data structure diagrams." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 1, no. 2 (1969): 4-10.
- Kruse, Robert, and C. L. Tondo. Data structures and program design in
- C. Pearson Education India, 2007.
- Kruse, Robert, and C. L. Tondo. Data structures and program design in
- C. Pearson Education India, 2007.
- Sleator, Daniel D., and Robert EndreTarjan. "A data structure for dynamic trees." Journal of computer and system sciences 26, no. 3 (1983): 362- 391.
- Hoel, Erik G., and Hanan Samet. "A qualitative comparison study of data structures for large line segment databases." In Proceedings of the 1992 ACM SIGMOD international conference on Management of data, pp. 205-214. 1992.
- Forouzan, Behrouz A. Cryptography & network security. McGraw-Hill, Inc., 2007.
- Stinson, Douglas Robert, and Maura Paterson. Cryptography: theory and practice. CRC press, 2018.
- Wang, Xiao Shaun, Kartik Nayak, Chang Liu, TH Hubert Chan, Elaine Shi, Emil Stefanov, and Yan Huang. "Oblivious data structures." In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 215-226. 2014.
- Micciancio, Daniele. "Oblivious data structures: applications to cryptography." In Proceedings of the twenty-ninth annual ACM symposium on Theory of computing, pp. 456-464. 1997.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.