Showing 1693–1704 of 2014 results

  • Secure Cloud Storage Using Android

    Secure Cloud Storage Using Android

    0 out of 5
    3,500

    Secure Cloud Storage Using Android Abstract?Today android devices face many resource challenges like battery life, storage, bandwidth etc. cloud computing offers advantages to users by allowing them to use infrastructures, platforms and software by cloud providers elastically in an on-demand fashion at low cost. Android Cloud Computing (ACC) provides android users with data storage and…

  • Secure Data Aggregation in Wireless SensorNetworks: Filtering out the Attacker?s Impact

    Secure Data Aggregation in Wireless SensorNetworks: Filtering out the Attacker?s Impact

    0 out of 5
    4,500

    Secure Data Aggregation in Wireless SensorNetworks: Filtering out the Attacker?s Impact Abstract?Wireless sensor networks (WSNs) are increasingly used in many applications, such as volcano and fire monitoring, urban sensing, and perimeter surveillance. In a large WSN, in-network data aggregation (i.e., combining partial results at intermediate nodes during message routing) significantly reduces the amount of communication…

  • Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

    Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

    0 out of 5
    4,500

    Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks Abstract?Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks. Due to limited computational power and energy resources, aggregation of data from multiple sensor nodes done at the aggregating node is usually accomplished by simple methods such…

  • Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

    Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

    0 out of 5
    4,500

    Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks Abstract? Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks. Due to limited computational power and energy resources, aggregation of data from multiple sensor nodes done at the aggregating node is usually accomplished by simple methods…

  • Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

    Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

    0 out of 5
    4,500

    Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks Abstract? Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks. At present, due to limited computational power and energy resources of sensor nodes, aggregation of data from multiple sensor nodes done at the aggregating node is…

  • Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

    Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

    0 out of 5
    4,500

    Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks   Abstract?Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks. Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by…

  • Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

    Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

    0 out of 5
    4,500

    Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Abstract?Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks. Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers…

  • Secure Deduplication with Efficient and Reliable Convergent Key Management

    Secure Deduplication with Efficient and Reliable Convergent Key Management

    0 out of 5
    4,500

    Secure Deduplication with Efficient and Reliable Convergent Key Management Abstract?Secure Deduplication with Efficient and Reliable Convergent Key Management. Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it is, an arising challenge is to perform secure…

  • Secure Distributed Deduplication Systems with Improved Reliability

    Secure Distributed Deduplication Systems with Improved Reliability

    0 out of 5
    4,500

    Secure Distributed Deduplication Systems with Improved Reliability Abstract? Secure Distributed Deduplication Systems with Improved Reliability. Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. However, there is only one copy for each ?le stored in cloud even if…

  • Secure file transfer System

    Secure file transfer System

    0 out of 5
    4,500

    Secure file transfer System Abstract?Secure file transfer System. The Iowa Campaign Finance Disclosure project (ICFD) is a pilot effort to develop a simple and secure way for candidates running for public office or Political Action Committees (PACs) to disclose required financial information. In the prototype system described in this paper, a candidate or PAC can…

  • Secure kNN Query Processing in  Untrusted Cloud Environments

    Secure kNN Query Processing in Untrusted Cloud Environments

    0 out of 5
    4,500

    Secure kNN Query Processing in Untrusted Cloud Environments Abstract?Mobile devices with geo-positioning capabilities (e.g., GPS) enable users to access information that is relevant to their present location. Users are interested in querying about points of interest (POI) in their physical proximity, such as restaurants, cafes, ongoing events, etc. Entities specialized in various areas of interest…

  • Secure kNN Query Processing in Untrusted Cloud Environments

    Secure kNN Query Processing in Untrusted Cloud Environments

    0 out of 5
    4,500

    Secure kNN Query Processing in Untrusted Cloud Environments   Abstract? Secure kNN Query Processing in Untrusted Cloud Environments. Mobile devices with geo-positioning capabilities (e.g., GPS) enable users to access information that is relevant to their present location. Users are interested in querying about points of interest (POI) in their physical proximity, such as restaurants, cafes,…

End of content

End of content