Showing 61–72 of 79 results

  • Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs

    Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs

    0 out of 5
    4,500

    Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs Abstract? Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=”…

  • Secure Sensitive Data Sharing on a Big Data Platform

    Secure Sensitive Data Sharing on a Big Data Platform

    0 out of 5
    4,500

    Secure Sensitive Data Sharing on a Big Data Platform Abstract? Users store vast amounts of sensitive data on a big data platform. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services. However, secure data sharing is problematic. This paper proposes a framework for secure…

  • Secure Two-Party differentially private data release for vertically partioned data

    Secure Two-Party differentially private data release for vertically partioned data

    0 out of 5
    4,500

    Secure Two-Party differentially private data release for vertically partioned data Abstract?Secure Two-Party differentially private data release for vertically partioned data. Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among the existing privacy models, ?-differential privacy provides one of the strongest privacy guarantees. In this paper, we < Final...

  • Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware

    Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware

    0 out of 5
    4,500

    Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware Abstract? Recently, malware has increasingly become a critical threat to embedded systems, while the conventional software solutions, such as antivirus and patches, have not been so successful in defending the ever-evolving and advanced malicious programs. we propose a hard ware enhanced architecture, GuardOL, to perform…

  • SEPIA: Secure-PIN-Authentication-as-a-Service for ATM using Mobile and Wearable Devices

    SEPIA: Secure-PIN-Authentication-as-a-Service for ATM using Mobile and Wearable Devices

    0 out of 5
    4,500

    SEPIA: Secure-PIN-Authentication-as-a-Service for ATM using Mobile and Wearable Devices Abstract? Credit card fraud is a common problem in today?s world. Financial institutions have registered major loses till today due to users being exposed of their credit card information. Shoulder-sur?ng or observation attacks, including card skimming and video recording with hidden cameras while users perform PIN-based…

  • Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing

    Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing

    0 out of 5
    4,500

    Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing Abstract? Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing. Cloud computing is an emerging data interactive paradigm to realize users? data remotely stored in an online cloud server. Cloud services provide great conveniences for the users to enjoy the on-demand cloud applications without considering the…

  • Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks

    Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks

    0 out of 5
    4,500

    Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks Abstract? Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks. Denial-of-service (DoS) and distributed DoS < Final Year Projects 2016 > DDoS are among the major threats to cyber-security, and client puzzle, which demands a client to perform computationally expensive operations before being granted services from a server,…

  • SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems

    SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems

    0 out of 5
    4,500

    SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems Abstract? SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ]…

  • STARS: A Statistical Traffic Pattern Discovery System for MANETs

    STARS: A Statistical Traffic Pattern Discovery System for MANETs

    0 out of 5
    4,500

    STARS: A Statistical Traffic Pattern Discovery System for MANETs Abstract?STARS: A Statistical Traffic Pattern Discovery System for MANETs. Many anonymity enhancing techniques have been proposed based on packet encryption to protect the communication anonymity of mobile ad hoc networks (MANETs). However, in this paper, we show that MANETs are still vulnerable under passive statistical traffic…

  • Structural Vulnerability Assessment of Community-based Routing in Opportunistic Networks

    Structural Vulnerability Assessment of Community-based Routing in Opportunistic Networks

    0 out of 5
    5,500

    Structural Vulnerability Assessment of Community-based Routing in Opportunistic Networks Abstract?Opportunistic networks enable mobile devices to communicate with each other through routes that are built dynamically, while messages are en route between the sender and the destination(s). The social structure and interaction of users of such devices dictate the performance of routing protocols in those networks….

  • TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks

    TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks

    0 out of 5
    4,500

    TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks Abstract? TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=”…

  • To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks and Rule-Based Model

    To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks and Rule-Based Model

    0 out of 5
    4,500

    To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks and Rule-Based Model Abstract? To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks and Rule-Based Model. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots…

End of content

End of content