Showing 85–96 of 207 results

  • FaceChange: Attaining Neighbor Node Anonymity in Mobile Opportunistic Social Networks with Fine-grained Control

    FaceChange: Attaining Neighbor Node Anonymity in Mobile Opportunistic Social Networks with Fine-grained Control

    0 out of 5
    4,500

    FaceChange: Attaining Neighbor Node Anonymity in Mobile Opportunistic Social Networks with Fine-grained Control Abstract-In mobile opportunistic social networks (MOSNs),mobile devices carried by people communicate with each other directly when they meet for proximity-based MOSN services (e.g., file sharing) without the support of infrastructures. In current methods, when nodes meet, they simply communicate with their real…

  • Fast and Scalable Range Query Processing With Strong Privacy Protection for Cloud Computing

    Fast and Scalable Range Query Processing With Strong Privacy Protection for Cloud Computing

    0 out of 5
    5,500

    Detecting Malicious Facebook Applications Abstract?Privacy has been the key road block to cloud computing as clouds may not be fully trusted. This paper is concerned with the problem of privacy-preserving range query processing on clouds. Prior schemes are weak in privacy protection as they cannot achieve index indistinguishability, and therefore allow the cloud to statistically…

  • Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm

    Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm

    0 out of 5
    4,500

    Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm Abstract? Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections]…

  • Fast Transmission to Remote Cooperative Groups:A New Key Management Paradigm

    Fast Transmission to Remote Cooperative Groups:A New Key Management Paradigm

    0 out of 5
    4,500

    Fast Transmission to Remote Cooperative Groups:A New Key Management Paradigm sequence and plain text   Abstract? The problem of efficiently and securely broadcasting to a remote cooperative group occurs in many newly emerging networks. A major challenge in devising such systems is to overcome the obstacles of the potentially limited communication from the group to…

  • Feature Selection by Maximizing Independent Classification Information

    Feature Selection by Maximizing Independent Classification Information

    0 out of 5
    5,500

    Feature Selection by Maximizing Independent Classification Information Abstract? Feature selection approaches based on mutual information can be roughly categorized into two groups. The first group minimizes the redundancy of features between each other. The second group maximizes the new classification information of features providing for the selected subset. A critical issue is that large new…

  • Full Verifiability for Outsourced Decryption in Attribute Based Encryption

    Full Verifiability for Outsourced Decryption in Attribute Based Encryption

    0 out of 5
    4,500

    Full Verifiability for Outsourced Decryption in Attribute Based Encryption Abstract– Attribute based encryption (ABE) is a popular cryptographic technology to protect the security of users? data. However, the decryption cost and ciphertext size restrict the application of ABE in practice. For most existing ABE schemes, the decryption cost and ciphertext size grow linearly with the…

  • GDVAN: A New Greedy Behavior Attack Detection Algor ithm For VANETs

    GDVAN: A New Greedy Behavior Attack Detection Algor ithm For VANETs

    0 out of 5
    4,500

    GDVAN: A New Greedy Behavior Attack Detection Algor ithm For VANETs Abstract– Vehicular Ad hoc Networks (VANETs), whose main objective is to provide road safety and enhance the driving conditions, are exposed to several kinds of attacks such as Denial of Service (DoS) attacks which affect the availability of the underlying services for legitimate users….

  • Generating Summary Risk Scores for Mobile Applications

    Generating Summary Risk Scores for Mobile Applications

    0 out of 5
    4,500

    Generating Summary Risk Scores for Mobile Applications Abstract?Generating Summary Risk Scores for Mobile Applications. One of Android’s main defense mechanisms against malicious apps is a risk communication mechanism which, before a user installs an app, warns the user about the permissions the < Final Year Projects > app requires, trusting that the user will make…

  • GeTrust: A guarantee-based trust model in  Chord-based P2P networks

    GeTrust: A guarantee-based trust model in Chord-based P2P networks

    0 out of 5
    5,500

    GeTrust: A guarantee-based trust model in Chord-based P2P networks Abstract? More and more users are attracted by P2P networks characterized by decentralization, autonomy and anonymity. However, users? unconstrained behavior makes it necessary to use a trust model when establishing trust relationships between peers. Most existing trust models are based on recommendations, which, however, suffer from…

  • Green Energy and Content-Aware Data Transmissions in Maritime Wireless Communication Networks

    Green Energy and Content-Aware Data Transmissions in Maritime Wireless Communication Networks

    0 out of 5
    4,500

    Green Energy and Content-Aware Data Transmissions in Maritime Wireless Communication Networks Abstract? Green Energy and Content-Aware Data Transmissions in Maritime Wireless Communication Networks. We investigate the network through-put and energy sustainability of green-energy-powered maritime wireless communication networks. Specifically, we study how to optimize the schedule of data traffic tasks to maximize the net-work throughput with…

  • Green Networking with Packet Processing Engine: Modeling and Optimization

    Green Networking with Packet Processing Engine: Modeling and Optimization

    0 out of 5
    4,500

    Green Networking with Packet Processing Engine: Modeling and Optimization Abstract? Green Networking with Packet Processing Engine: Modeling and Optimization, With the aim of controlling power consumption in metro/transport and core networks, we consider energy-aware devices able to reduce their energy requirements by adapting their performance. In particular, < Final Year Projects > we focus on…

  • GreenCoMP: Energy-Aware Cooperation for  Green Cellular Networks

    GreenCoMP: Energy-Aware Cooperation for Green Cellular Networks

    0 out of 5
    5,500

    Enabling Secure and Efficient Video Delivery through Encrypted In-network Caching Abstract? Switching off base stations (BSs) is an effective and efficient energy-saving solution for green cellular networks. The previous works focus mainly on when to switch off BSs without sacrificing the traffic demands of current active users, and then enlarge the coverage of the stay-on…

End of content

End of content