Showing 229–240 of 860 results

  • CompactDFA: Scalable Pattern Matching Using Longest Prefix Match Solutions

    CompactDFA: Scalable Pattern Matching Using Longest Prefix Match Solutions

    0 out of 5
    4,500

    CompactDFA: Scalable Pattern Matching Using Longest Prefix Match Solutions Abstract? CompactDFA: Scalable Pattern Matching Using Longest Prefix Match Solutions. A central component in all contemporary intrusion detection systems (IDSs) is their pattern matching algorithms, which are often based on constructing and traversing a deterministic finite automaton (DFA) that represents the patterns. While this approach ensures…

  • Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users

    Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users

    0 out of 5
    4,500

    Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users Abstract? Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users. When a single < Final Year Projects 2016 > Cloud service (i.e., a software image and a virtual machine), on its own, cannot satisfy all the user requirements, a composition of Cloud services is…

  • Compatibility-Aware Cloud Service Composition under Fuzzy Preferences of Users

    Compatibility-Aware Cloud Service Composition under Fuzzy Preferences of Users

    0 out of 5
    4,500

    Compatibility-Aware Cloud Service Composition under Fuzzy Preferences of Users Abstract?Compatibility-Aware Cloud Service Composition under Fuzzy Preferences of Users. When a single Cloud service (i.e., a software image and a virtual machine), on its own, cannot satisfy all the user requirements, a composition of Cloud services is required. < Final Year Projects > Cloud service composition,…

  • Composing Kerberos and Multimedia Internet KEYing (MIKEY)  for AuthenticatedTransport of Group Keys

    Composing Kerberos and Multimedia Internet KEYing (MIKEY) for AuthenticatedTransport of Group Keys

    0 out of 5
    4,500

    Techniques to Minimize State Transfer Costs for Dynamic Execution Of?oading in Mobile Cloud Computing Abstract?Techniques to Minimize State Transfer Costs for Dynamic Execution Of?oading in Mobile Cloud Computing. We motivate and present two designs for the composition of the authentication protocol, Kerberos, and the key transport protocol, Multimedia Internet KEYing (MIKEY) for authenticated transport of…

  • Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds

    Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds

    0 out of 5
    5,500

    Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds Abstract? An electronic health (e-health) record system is a novel application that will bring great convenience in healthcare. The privacy and security of the sensitive personal information are the major concerns of the users, which could hinder further development and…

  • Connecting Intelligent Things in Smart Hospitals Using NB-IoT

    Connecting Intelligent Things in Smart Hospitals Using NB-IoT

    0 out of 5
    4,500

    Connecting Intelligent Things in Smart Hospitals Using NB-IoT Abstract-The widespread use of Internet of Things (IoT), especially smart wearables, will play an important role in improving the quality of medical care, bringing convenience for patients and improving the management level of hospitals. However, due to the limitation of communication protocols, there exists non unified architecture…

  • Consistency_as_a_Service_Auditing_Cloud_Consistency

    Consistency_as_a_Service_Auditing_Cloud_Consistency

    0 out of 5
    4,500

    Consistency_as_a_Service_Auditing_Cloud_Consistency Abstract?Consistency_as_a_Service_Auditing_Cloud_Consistency. Cloud storage services have become commercially popular due to their overwhelming advantages. To provide ubiquitous always-on access, a cloud service provider (CSP) maintains multiple replicas for each piece of data on geographically distributed servers. A key problem of using the replication technique in clouds is that it is very expensive to achieve strong…

  • Constructing a Global Social Service Network for Better Quality of Web Service Discovery

    Constructing a Global Social Service Network for Better Quality of Web Service Discovery

    0 out of 5
    4,500

    Constructing a Global Social Service Network for Better Quality of Web Service Discovery Abstract?Web services have had a tremendous impact on the Web for supporting a distributed service-based economy on a global scale. However, despite the outstanding progress, their uptake on a Web scale has been significantly less than initially anticipated. The isolation of services…

  • Context-Aware Verifiable Cloud Computing

    Context-Aware Verifiable Cloud Computing

    0 out of 5
    4,500

    Context-Aware Verifiable Cloud Computing Abstract In the first place,Internet of Things (IoTs) has emerged to motivate various intelligent applications based on the data collected by various “things.”In addition, Cloud computing plays an important role for big data processing by providing data computing and processing services.In spite of,cloud service providers may invade data privacy and provide…

  • Context-Aware Verifiable Cloud Computing

    Context-Aware Verifiable Cloud Computing

    0 out of 5
    4,500

    Context-Aware Verifiable Cloud Computing Abstract– Internet of Things (IoTs) has emerged to motivate various intelligent applications based on the data collected by various ??things.?? Cloud computing plays an important role for big data processing by providing data computing and processing services. However, cloud service providers may invade data privacy and provide inaccurate data processing results…

  • Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts

    Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts

    0 out of 5
    5,500

    Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts Abstract? Traditional broadcast encryption (BE) schemes al-low a sender to securely broadcast to any subset of members but require a trusted party to distribute decryption keys. Group key agreement (GKA) protocols enable a group of members to negotiate a common encryption key via open networks so…

  • Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption

    Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption

    0 out of 5
    4,500

    Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption Abstract? Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption. Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns…

End of content

End of content