Showing 1117–1128 of 1333 results

  • Secure and Efficient Protocol for Route Optimization in PMIPv6-based Smart Home IoT Networks

    0 out of 5
    4,500

    Game Theory Based Correlated Pr ivacy Preser ving Analysis in Big Data Abstract-The communication in the Smart Home Internet of Things (SH-IoT) comprising various electronic devices and sensors is very sensitive and crucial. In addition, the key requirements of SH-IoT include channel security, handover support, mobility management, and consistent data rates. Proxy Mobile IPv6 (PMIPv6)…

  • Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure

    0 out of 5
    4,500

    Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure Abstract-In the first place, with the fast growing demands for the big data, we need to manage and store the big data in the cloud. Since the cloud is not fully trusted and it can be accessed by any users, the data in the…

  • Secure Authentication using Dynamic Virtual Keyboard Layout

    0 out of 5
    5,500

    Secure Authentication using Dynamic Virtual Keyboard Layout Abstract-Virtual Keyboard authentication has helped users to protect their username and passwords from being captured by key loggers, spyware and malicious bots. However Virtual Keyboard still suffers from numerous other fallacies that an attacker can take advantage of. These include click based? screenshot capturing, over the shoulder spoofing…

  • Secure Communication in Uplink Transmissions: User Selection and Multiuser Secrecy Gain

    0 out of 5
    5,500

    Secure Communication in Uplink Transmissions: User Selection and Multiuser Secrecy Gain Abstract?secure communications in uplink transmissions, where there are a base station (BS) with M receive antennas, K mobile users each with a single antenna, and an eavesdropper with N receive antennas. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source…

  • Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage

    0 out of 5
    5,500

    Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage Abstract? In cloud storage services, deduplication technology is commonly used to reduce the space and bandwidth requirements of services by eliminating redundant data and storing only a single copy of them. Deduplication is most effective when multiple users outsource the same data to the cloud…

  • Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption

    0 out of 5
    5,500

    Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption Abstract? Cloud computing provides a flexible and convenient way for data sharing, which brings various benefits for both the society and individuals. But there exists a natural resistance for users to directly outsource the shared data to the cloud server since the data often contain…

  • Secure Deduplication with Efficient and Reliable Convergent Key Management

    0 out of 5
    5,500

    Secure Deduplication with Efficient and Reliable Convergent Key Management Abstract?Abstract Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it is, an arising challenge is to perform secure deduplication in cloud storage. Although convergent encryption has…

  • Secure Distributed Deduplication Systems with Improved Reliability

    0 out of 5
    5,500

    Secure Distributed Deduplication Systems with Improved Reliability Abstract? Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. However, there is only one copy for each file stored in cloud even if such a file is owned by a…

  • Secure k-NN Query on Encrypted Cloud Data with Multiple Keys

    0 out of 5
    4,500

    Secure k-NN Query on Encrypted Cloud Data with Multiple Keys Abstract-The k-nearest neighbors ( k-NN) query is a fundamental primitive in spatial and multimedia databases. It has extensive applications in location-based services, classification & clustering and so on. With the promise of confidentiality and privacy, massive data are increasingly outsourced to cloud in the encrypted…

  • Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach

    0 out of 5
    5,500

    Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach Abstract? Key pre-distribution algorithms have recently emerged as efficient alter natives of key management in today?s secure communications landscape. Secure routing techniques using key pre-distribution algorithms require special algorithms capable of finding optimal secure over lay paths. To the best of our knowledge, the…

  • Secure Routing for Mobile Ad hoc Networks

    0 out of 5
    5,500

    Secure Routing for Mobile Ad hoc Networks Abstract?Abstract technology advocates self-organized wireless interconnection of communication devices that would either extend or operate in concert with the wired networking infrastructure or, possibly,evolve to autonomous networks. In either case, the proliferation of MANET-based applications depends on a multitude of factors, with trustworthiness being one of the primary…

  • Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications

    0 out of 5
    4,500

    Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications Abstract– Internet of Things (IoT) is a network of all devices that can be accessed through the internet. These devices can be remotely accessed and controlled using existing network infrastructure, thus allowing a direct integration of computing systems with the physical world. This also reduces…

End of content

End of content