Showing 565–576 of 665 results

  • Placeholder

    Secure kNN Query Processing in Untrusted Cloud Environments

    0 out of 5
    4,500

    Secure kNN Query Processing in Untrusted Cloud Environments Abstract? Secure kNN Query Processing in Untrusted Cloud Environments. Mobile devices with geo-positioning capabilities (e.g., GPS) enable users to access information that is relevant to their present location. Users are interested in querying about points of interest (POI) in their physical proximity, such as restaurants, cafes, ongoing…

  • Placeholder

    Secure Logging As a Service?Delegating Log Management to the Cloud

    0 out of 5
    4,500

    Secure Logging As a Service?Delegating Log Management to the CloudLog files helps cyber forensic process in inquiring and seizing computer, obtaining electronic evidence for criminal investigations and maintaining computer records for the federal rules of evidence. So it can be said that logging is closely related to Forensic Computing. To make the logs permissible for…

  • Secure Overlay Cloud Storage with Access Control and Assured Deletion document preparation

    0 out of 5
    4,500

    Secure Overlay Cloud Storage with Access Control and Assured Deletion document preparation Abstract? We can now outsource data backups off-site to third-party cloud storage services so as to reduce data management costs. However, we must provide security guarantees for the outsourced data, which is now maintained by third parties. We design and implement FADE, a…

  • SECURE SOLUTION FOR MOBILE ACCESS TO PATIENT?S HEALTHCARE RECORDS

    0 out of 5
    3,500

    SECURE SOLUTION FOR MOBILE ACCESS TO PATIENT?S HEALTHCARE RECORDS Abstract?Mobile devices are today widely accepted and their capability to provide access to services independent of user time and location make them well suited for provision of healthcare services to both patients and healthcare personnel. However, mobile services are still not generally allowed to operate with…

  • Placeholder

    Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption

    0 out of 5
    4,500

    Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption Abstract? SThe provisioning of basic security mechanisms such as authentication and confidentiality is highly challenging in a content-based publish/subscribe system. Authentication of publishers and subscribers is difficult to achieve due to the loose coupling of publishers and subscribers. Likewise, confidentiality of events and subscriptions conflicts with content-based routing.<...

  • Placeholder

    Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis

    0 out of 5
    4,500

    Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis Abstract?With the rapid development of reputation systems in various online social networks, manipulations against such systems are evolving quickly. In this paper, we propose scheme TATA, the abbreviation of joint Temporal And Trust Analysis, < Final Year Projects >which protects reputation systems from a new…

  • Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks

    0 out of 5
    4,500

    Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks Abstract? Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential to be authenticated by multiple service providers in a distributed computer network. Recently, Chang and Lee proposed a new SSO scheme and claimed its security by…

  • Placeholder

    Security and Privacy Enhancing in Multi cloud Architecture

    0 out of 5
    4,500

    Security and Privacy Enhancing in Multi cloud Architecture Abstract? Security and Privacy Enhancing in Multi cloud Architecture Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ]…

  • Placeholder

    Security and privacy for storage and computation in cloud computing

    0 out of 5
    4,500

    Security and privacy for storage and computation in cloud computing Abstract? Security and privacy for storage and computation in cloud computing. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″…

  • Security and Privacy-Enhancing Multicloud Architectures

    0 out of 5
    4,500

    Security and Privacy-Enhancing Multicloud Architectures Abstract? Security and Privacy-Enhancing Multicloud Architectures. Security challenges are still among the biggest obstacles when considering the adoption of cloud services. This triggered a lot of research activities, resulting in a quantity of proposals targeting the various cloud security threats. Alongside with these security issues, the cloud paradigm comes with…

  • Placeholder

    Security challenges in vehicular Cloud

    0 out of 5
    4,500

    Security challenges in vehicular Cloud Abstract? In a series of recent papers, Prof. Olariu and his co-workers have promoted the vision of vehicular clouds (VCs), a nontrivial extension, along several dimensions, of conventional cloud computing. In a VC, underutilized vehicular resources including computing power, storage, and Internet connectivity can be shared between drivers or rented…

  • Placeholder

    Security system based on Viola Jones Detection

    0 out of 5
    4,500

    Security system based on Viola Jones Detection Abstract? ris recognition is a biometric system for access control that uses the most unique characteristic of the human body, the irisemployed in automated border crossings, nationalID systems,etc.< Final Year Projects >This paper illustrates techniquesto improve performance of iris recognition system based onstationary images using NI LabVIEW(Vision Module).Region…

End of content

End of content