Showing 3229–3240 of 3871 results

  • Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage

    Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage

    0 out of 5
    4,500

    Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage Abstract-Cloud storage facilitates both individuals and enterprises to cost effectively share their data over the Internet.However,this also brings difficult challenges to the access control of shared data since few cloud servers can be fully trusted. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising approach that enables…

  • Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks

    Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks

    0 out of 5
    4,500

    Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks Abstract?Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks. Secure data transmission is a critical issue for wireless sensor networks (WSNs). Clustering is an effective and practical way to enhance the system performance of WSNs. In this paper, we study a secure data transmission…

  • Secure and Efficient Protocol for Route Optimization in PMIPv6-based Smart Home IoT Networks

    Secure and Efficient Protocol for Route Optimization in PMIPv6-based Smart Home IoT Networks

    0 out of 5
    4,500

    Game Theory Based Correlated Pr ivacy Preser ving Analysis in Big Data Abstract-The communication in the Smart Home Internet of Things (SH-IoT) comprising various electronic devices and sensors is very sensitive and crucial. In addition, the key requirements of SH-IoT include channel security, handover support, mobility management, and consistent data rates. Proxy Mobile IPv6 (PMIPv6)…

  • Secure Anonymous Key Distribution Scheme for Smart Grid

    Secure Anonymous Key Distribution Scheme for Smart Grid

    0 out of 5
    4,500

    Secure Anonymous Key Distribution Scheme for Smart Grid Abstract? Secure Anonymous Key Distribution Scheme for Smart Grid. To fully support information management among various < Final Year Projects 2016 > stakeholders in smart grid domains, how to establish secure communication sessions has become an important issue for smart grid environments. In order to support secure…

  • Secure Audit Service by Using TPA for Data  Integrity in Cloud System

    Secure Audit Service by Using TPA for Data Integrity in Cloud System

    0 out of 5
    4,500

    Secure Audit Service by Using TPA for Data Integrity in Cloud System Abstract? Secure Audit Service by Using TPA for Data Integrity in Cloud System. Cloud computing is the vast computing utility, where users can remotely store their data into the cloud so to have the benefit of the on-demand < Final Year Projects 2016…

  • Secure Auditing and Deduplicating Data in Cloud

    Secure Auditing and Deduplicating Data in Cloud

    0 out of 5
    4,500

    Secure Auditing and Deduplicating Data in Cloud Abstract? Secure Auditing and Deduplicating Data in Cloud. As the cloud computing technology develops during the last decade, outsourcing data to cloud service for storage becomes an attractive trend, which bene?ts in sparing efforts on heavy data maintenance and management. Nevertheless, since the outsourced cloud storage is not…

  • Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure

    Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure

    0 out of 5
    4,500

    Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure Abstract-In the first place, with the fast growing demands for the big data, we need to manage and store the big data in the cloud. Since the cloud is not fully trusted and it can be accessed by any users, the data in the…

  • Secure Authentication using Dynamic Virtual Keyboard Layout

    Secure Authentication using Dynamic Virtual Keyboard Layout

    0 out of 5
    5,500

    Secure Authentication using Dynamic Virtual Keyboard Layout Abstract-Virtual Keyboard authentication has helped users to protect their username and passwords from being captured by key loggers, spyware and malicious bots. However Virtual Keyboard still suffers from numerous other fallacies that an attacker can take advantage of. These include click based? screenshot capturing, over the shoulder spoofing…

  • Secure Authentication Using Session Based Password with Virtual Keyboard

    Secure Authentication Using Session Based Password with Virtual Keyboard

    0 out of 5
    4,500

    Secure Authentication Using Session Based Password with Virtual Keyboard Abstract-Early people use textual passwords as a security but these passwords get affected to the various attacks like dictionary attack, shoulder surfing, etc. After the period, graphical passwords are coming to the existence but the graphical passwords have some own disadvantages such as they require more…

  • Android Project

    Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture

    0 out of 5
    3,500

    Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture Abstract?Most state-of-the-art binary image steganographic techniques only consider the ?ipping distortion according to the human visual system, which will be not secure when they are attacked by steganalyzers. In this paper, a binary image steganographic scheme that aims to minimize the embedding distortion…

  • Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture

    Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture

    0 out of 5
    4,500

    Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture Abstract? Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture. Most state-of-the-art binary image steganographic techniques only consider the flipping distortion according to the human visual system, which will be not secure when they are attacked by steganalyzers. In this…

  • Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture

    Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture

    0 out of 5
    4,500

    Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture Abstract? Most state-of-the-art binary image steganographic techniques only consider the ?ipping distortion according to the human visual system, which will be not secure when they are attacked by steganalyzers. In this paper, a binary image steganographic scheme that aims to minimize the embedding…

End of content

End of content