Showing 3673–3682 of 3682 results

  • White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures

    White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures

    0 out of 5
    4,500

    White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures Abstract? White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″…

  • White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively

    White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively

    0 out of 5
    5,500

    White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively Abstract-Ciphertext-policy attribute-based encryption (CP-ABE) has been proposed to enable fine-grained access control on encrypted data for cloud storage service. In the context of CP-ABE, since the decryption privilege is shared by multiple users who have the same attributes, it…

  • Wind Turbine Accidents: A Data Mining Study

    Wind Turbine Accidents: A Data Mining Study

    0 out of 5
    4,500

    Wind Turbine Accidents: A Data Mining Study Abstract– While the global production of wind energy is increasing, there exists a significant gap in the academic and practice literature regarding the analysis of wind turbine accidents.With this intension, presents the results obtained from the analysis of 240 wind turbine accidents from around the world. The main…

  • Wireless Resource Allocation in Next Generation Healthcare Facilities

    Wireless Resource Allocation in Next Generation Healthcare Facilities

    0 out of 5
    4,500

    Wireless Resource Allocation in Next Generation Healthcare Facilities Abstract? Wireless Resource Allocation in Next Generation Healthcare Facilities. Healthcare facilities with intelligent wireless devices can reduce the workload of the paramedic staff. These devices include low-power wireless sensors, personal wireless hub (PWH), and receivers. The PWH can act as a relay in the hospital network. To…

  • Workflow Transformation for Real-Time Big Data Processing

    Workflow Transformation for Real-Time Big Data Processing

    0 out of 5
    5,500

    Workflow Transformation for Real-Time Big Data Processing Abstract?Abstract With the explosion of big data, processing and analyzing large numbers of continuous data streams in real-time,such as social media stream, sensor data streams, log streams,stock exchanges streams, etc., has become a crucial requirement for many scientific and industrial applications in recent years.Increased volume of streaming data…

  • Workload modeling for resource usage analysis and simulation in cloud computing

    Workload modeling for resource usage analysis and simulation in cloud computing

    0 out of 5
    4,500

    Workload modeling for resource usage analysis and simulation in cloud computing Abstract-In the first place, workload modeling enables performance analysis and simulation of cloud resource management policies, which allows cloud providers to improve their systems? Quality of Service (QoS) and researchers to evaluate new policies without deploying expensive large scale environments. However, workload modeling is…

  • Workload-Based Software Rejuvenation in Cloud Systems

    Workload-Based Software Rejuvenation in Cloud Systems

    0 out of 5
    4,500

    Workload-Based Software Rejuvenation in Cloud Systems Abstract? Workload-Based Software Rejuvenation in Cloud Systems. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice Conference Video On…

  • Wormhole Attack Detection Algorithms in Wireless Network Coding Systems

    Wormhole Attack Detection Algorithms in Wireless Network Coding Systems

    0 out of 5
    4,500

    Wormhole Attack Detection Algorithms in Wireless Network Coding Systems Abstract?Wormhole Attack Detection Algorithms in Wireless Network Coding Systems. Network coding has been shown to be an effective approach to improve the wireless system performance. However, many security issues impede its wide deployment in practice. Besides the well-studied pollution attacks, there is another severe threat, that…

  • Wormhole Attack Detection Algorithms in WirelessNetwork Coding Systems

    Wormhole Attack Detection Algorithms in WirelessNetwork Coding Systems

    0 out of 5
    4,500

    Wormhole Attack Detection Algorithms in WirelessNetwork Coding Systems Abstract?Wormhole Attack Detection Algorithms in WirelessNetwork Coding Systems. Network coding has been shown to be an effective approach to improve the wireless system performance. However, many security issues impede its wide deployment in practice. Besides the < Final Year Projects > well-studied pollution attacks, there is another…

  • Wormhole: The Hidden Virus Propagation Power of a Search Engine in Social Networks

    Wormhole: The Hidden Virus Propagation Power of a Search Engine in Social Networks

    0 out of 5
    4,500

    Wormhole: The Hidden Virus Propagation Power of a Search Engine in Social Networks Abstract-Today search engines are tightly coupled with social networks, and present users with a double-edged sword: they are able to acquire information interesting to users but are also capable of spreading viruses introduced by hackers. It is challenging to characterize how a…

End of content

End of content