Showing 1729–1740 of 2067 results

  • Secure Auditing and Deduplicating Data in Cloud

    Secure Auditing and Deduplicating Data in Cloud

    0 out of 5
    4,500

    Secure Auditing and Deduplicating Data in Cloud Abstract? Secure Auditing and Deduplicating Data in Cloud. As the cloud computing technology develops during the last decade, outsourcing data to cloud service for storage becomes an attractive trend, which bene?ts in sparing efforts on heavy data maintenance and management. Nevertheless, since the outsourced cloud storage is not…

  • Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture

    Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture

    0 out of 5
    4,500

    Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture Abstract? Most state-of-the-art binary image steganographic techniques only consider the ?ipping distortion according to the human visual system, which will be not secure when they are attacked by steganalyzers. In this paper, a binary image steganographic scheme that aims to minimize the embedding…

  • Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture

    Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture

    0 out of 5
    4,500

    Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture Abstract? Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture. Most state-of-the-art binary image steganographic techniques only consider the flipping distortion according to the human visual system, which will be not secure when they are attacked by steganalyzers. In this…

  • Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture

    Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture

    0 out of 5
    3,500

    Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture Abstract?Most state-of-the-art binary image steganographic techniques only consider the ?ipping distortion according to the human visual system, which will be not secure when they are attacked by steganalyzers. In this paper, a binary image steganographic scheme that aims to minimize the embedding distortion…

  • Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture

    Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture

    0 out of 5
    4,500

    Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture Abstract? Most state-of-the-art binary image steganographic techniques only consider the ?ipping distortion according to the human visual system, which will be not secure when they are attacked by steganalyzers. In this paper, a binary image steganographic scheme that aims to minimize the embedding…

  • Secure Cloud Storage Meets with Secure Network Coding

    Secure Cloud Storage Meets with Secure Network Coding

    0 out of 5
    4,500

    Secure Cloud Storage Meets with Secure Network Coding Abstract? Secure Cloud Storage Meets with Secure Network Coding. Reveals an intrinsic relationship between secure cloud storage and secure network coding for the first time. Secure cloud storage was proposed only recently while secure network coding has been studied for more than ten years. Although the two…

  • Secure Cloud Storage Using Android

    Secure Cloud Storage Using Android

    0 out of 5
    3,500

    Secure Cloud Storage Using Android Abstract?Today android devices face many resource challenges like battery life, storage, bandwidth etc. cloud computing offers advantages to users by allowing them to use infrastructures, platforms and software by cloud providers elastically in an on-demand fashion at low cost. Android Cloud Computing (ACC) provides android users with data storage and…

  • Secure Data Aggregation in Wireless SensorNetworks: Filtering out the Attacker?s Impact

    Secure Data Aggregation in Wireless SensorNetworks: Filtering out the Attacker?s Impact

    0 out of 5
    4,500

    Secure Data Aggregation in Wireless SensorNetworks: Filtering out the Attacker?s Impact Abstract?Wireless sensor networks (WSNs) are increasingly used in many applications, such as volcano and fire monitoring, urban sensing, and perimeter surveillance. In a large WSN, in-network data aggregation (i.e., combining partial results at intermediate nodes during message routing) significantly reduces the amount of communication…

  • Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

    Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

    0 out of 5
    4,500

    Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks Abstract?Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks. Due to limited computational power and energy resources, aggregation of data from multiple sensor nodes done at the aggregating node is usually accomplished by simple methods such…

  • Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

    Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

    0 out of 5
    4,500

    Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks Abstract? Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks. Due to limited computational power and energy resources, aggregation of data from multiple sensor nodes done at the aggregating node is usually accomplished by simple methods…

  • Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

    Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

    0 out of 5
    4,500

    Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks Abstract? Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks. At present, due to limited computational power and energy resources of sensor nodes, aggregation of data from multiple sensor nodes done at the aggregating node is…

  • Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

    Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

    0 out of 5
    4,500

    Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks   Abstract?Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks. Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by…

End of content

End of content