Showing 73–79 of 79 results

  • Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service

    Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service

    0 out of 5
    5,500

    Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service Abstract?Collection and analysis of various logs (e.g., process logs, network logs) are fundamental activities in computer forensics. Ensuring the security of the activity logs is therefore crucial to ensure reliable forensics investigations. However, because of the black-box nature of clouds and the volatility and co-mingling of cloud…

  • Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service

    Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service

    0 out of 5
    4,500

    Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service Abstract?Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service. Collection and analysis of various logs < Final Year Projects 2016 > e.g., process logs, network logs are fundamental activities in computer forensics. Ensuring the security of the activity logs is therefore crucial to ensure reliable forensics investigations. However,…

  • Towards Privacy-preserving and Practical Image-centric Social Discovery

    Towards Privacy-preserving and Practical Image-centric Social Discovery

    0 out of 5
    5,500

    Towards Privacy-preserving and Practical Image-centric Social Discovery Abstract? Images are becoming one of the key enablers of user connectivity in social media applications. Many of them are directly exploring image content to suggest new friends with similar interests. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete…

  • Trustworthy Parking Communities: Helping Your Neighbor to Find a Space

    Trustworthy Parking Communities: Helping Your Neighbor to Find a Space

    0 out of 5
    5,500

    Trustworthy Parking Communities: Helping Your Neighbor to Find a Space Abstract?Cooperation between vehicles facilitates traffic management, road safety and infotainment applications. Cooperation, however, requires trust in the validity of the received information. In this paper, we tackle the challenge of securely exchanging parking spot availability information. Trust is crucial in order to support the decision…

  • Universal Network Coding-Based Opportunistic Routing for Unicast

    Universal Network Coding-Based Opportunistic Routing for Unicast

    0 out of 5
    4,500

    Universal Network Coding-Based Opportunistic Routing for Unicast Abstract?Universal Network Coding-Based Opportunistic Routing for Unicast. Network coding-based opportunistic routing has emerged as an elegant way to optimize the capacity of lossy wireless multihop networks by reducing the amount of required feedback messages. Most of the works on network coding-based opportunistic routing in the literature assume that…

  • Using Facebook for Image Steganography

    Using Facebook for Image Steganography

    0 out of 5
    4,500

    Using Facebook for Image Steganography Abstract? Facebook is available on hundreds of millions of desktop and mobile computing platforms around the world and because it is available on many different kinds of platforms (from desktops and laptops running Windows, Unix, or OS X to hand held devices running iOS, Android, or Windows Phone), it would…

  • White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures

    White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures

    0 out of 5
    4,500

    White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures Abstract? White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″…

End of content

End of content