Malware Propagation in Large-Scale Networks Abstract? Malware Propagation in Large-Scale Networks, a critical threat to network security. However, we have very limited understanding of malware behavior in networks to date. In this paper, we investigate how malware propagates in networks from a global perspective. We formulate the problem, and establish a rigorous two layer epidemic…
MFTS: A Multi-level Fault-tolerant Archiving Storage with Optimized Maintenance Bandwidth Abstract?MFTS: A Multi-level Fault-tolerant Archiving Storage with Optimized Maintenance Bandwidth. In this paper, we propose a multi-level fault-tolerant storage cluster called MFTS, which provides flexible reliability for a wide variety of applications. MFTS makes use of a reliability upper-bound (i.e., Parameter r) to guide the…
Monitor Placement to Timely Detect Misinformation in Online Social Networks Abstract? Monitor Placement to Timely Detect Misinformation in Online Social Networks. Online Social Networks < Final Year Projects 2016 > such as Facebook, Twitter and Google+, facilitate the interactions and communications among people. However, they also make it a fertile land for misinformation to rapidly…
Multi Factor Authentication : Privacy Preserving System Abstract? Continuous re-authentication of users is a must to protect connections with long duration against any malicious activity. Users can be re-authenticated in numerous ways. One popular way is an approach that requires the presentation of two or more authentication factors (i.e., knowledge, possession, identity) called Multi-factor authentication…
My Privacy My Decision: Control of Photo Sharing on Online Social Networks Abstract? My Privacy My Decision: Control of Photo Sharing on Online Social Networks. Photo sharing is an attractive feature which popularizes Online Social Networks (OSNs). Unfortunately, it may leak users? privacy if they are allowed to post, comment, and tag a photo freely….
< Final Year Project > oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks Abstract?Text password is the most popular form of user authentication on websites due to its convenience and simplicity. However, users’ passwords are prone to be stolen and compromised under different threats and vulnerabilities. Firstly, users often select…
Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter Abstract? Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter It is long known attackers may use forged source IP address to conceal their real locations. To capture the spoofers, a number of IP traceback mechanisms have been proposed. However,…
PBA: Prediction-based Authentication for Vehicle-to-Vehicle Communications Abstract? PBA: Prediction-based Authentication for Vehicle-to-Vehicle Communications. In vehicular networks,broadcast communications are critically important,as many safety-related applications rely on single-hop beacon messages broadcast to neighbor vehicles.However,it becomes a challenging problem to design a broadcast authentication scheme for secure vehicle-to-vehicle communications. Especially when a large number of beacons arrive in…
PDA: Semantically Secure Time-Series Data Analytics with Dynamic User Groups Abstract? Third-party analysis on private records is becoming increasingly important due to the widespread data collection for various analysis purposes. However, the data in its original form often contains sensitive information about individuals, and its publication will severely breach their privacy. In this paper, we…
Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense Abstract?Along with the popularity of mobile social networks (MSNs) is the increasing danger of privacy breaches due to user location exposures. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database…
Privacy preserving data sharing with AIDA Abstract?Privacy preserving data sharing with AIDA. This paper describes the problem of Privacy Preserving data Mining Data mining is the process of extracting hidden information in the database. The current trend in business colaboration shares the data mine results gain mutual benefits of. < Final Year Projects > Privacy…
Privacy Preserving Key Exchange Over Internet Abstract?Privacy Preserving Key Exchange Over Internet. Key-exchange, in particular Diffie-Hellman key-exchange (DHKE), is among the core cryptographic mechanisms for ensuring network security. For key-exchange over the Internet, both security and privacy are desired. In this paper, we develop a family of privacy-preserving authenticated DHKE protocols named deniable Internet key-exchange…