Showing 3253–3264 of 3871 results

  • .NET Projects - Networking

    Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

    0 out of 5
    4,500

    Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks   Abstract?Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks. Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by…

  • Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption

    Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption

    0 out of 5
    5,500

    Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption Abstract? Cloud computing provides a flexible and convenient way for data sharing, which brings various benefits for both the society and individuals. But there exists a natural resistance for users to directly outsource the shared data to the cloud server since the data often contain…

  • Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing

    Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing

    0 out of 5
    4,500

    Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing Abstract-With the fast development of Industrial Internet of Things (IIoT), a large amount of data is being generated continuously by different sources. Storing all the raw data in the IIoT devices locally is unwise considering that the end devices? energy…

  • Secure Deduplication with Efficient and Reliable Convergent Key Management

    Secure Deduplication with Efficient and Reliable Convergent Key Management

    0 out of 5
    4,500

    Secure Deduplication with Efficient and Reliable Convergent Key Management Abstract?Secure Deduplication with Efficient and Reliable Convergent Key Management. Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it is, an arising challenge is to perform secure…

  • Secure Deduplication with Efficient and Reliable Convergent Key Management

    Secure Deduplication with Efficient and Reliable Convergent Key Management

    0 out of 5
    5,500

    Secure Deduplication with Efficient and Reliable Convergent Key Management Abstract?Abstract Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it is, an arising challenge is to perform secure deduplication in cloud storage. Although convergent encryption has…

  • Secure Distributed Deduplication Systems with Improved Reliability

    Secure Distributed Deduplication Systems with Improved Reliability

    0 out of 5
    4,500

    Secure Distributed Deduplication Systems with Improved Reliability Abstract? Secure Distributed Deduplication Systems with Improved Reliability. Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. However, there is only one copy for each ?le stored in cloud even if…

  • Secure Distributed Deduplication Systems with Improved Reliability

    Secure Distributed Deduplication Systems with Improved Reliability

    0 out of 5
    5,500

    Secure Distributed Deduplication Systems with Improved Reliability Abstract? Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. However, there is only one copy for each file stored in cloud even if such a file is owned by a…

  • Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs

    Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs

    0 out of 5
    4,500

    Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs Abstract? Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=”…

  • Secure file transfer System

    Secure file transfer System

    0 out of 5
    4,500

    Secure file transfer System Abstract?Secure file transfer System. The Iowa Campaign Finance Disclosure project (ICFD) is a pilot effort to develop a simple and secure way for candidates running for public office or Political Action Committees (PACs) to disclose required financial information. In the prototype system described in this paper, a candidate or PAC can…

  • Secure k-NN Query on Encrypted Cloud Data with Multiple Keys

    Secure k-NN Query on Encrypted Cloud Data with Multiple Keys

    0 out of 5
    4,500

    Secure k-NN Query on Encrypted Cloud Data with Multiple Keys Abstract-The k-nearest neighbors ( k-NN) query is a fundamental primitive in spatial and multimedia databases. It has extensive applications in location-based services, classification & clustering and so on. With the promise of confidentiality and privacy, massive data are increasingly outsourced to cloud in the encrypted…

  • Java Projects—Data Mining

    Secure kNN Query Processing in Untrusted Cloud Environments

    0 out of 5
    4,500

    Secure kNN Query Processing in Untrusted Cloud Environments Abstract?Mobile devices with geo-positioning capabilities (e.g., GPS) enable users to access information that is relevant to their present location. Users are interested in querying about points of interest (POI) in their physical proximity, such as restaurants, cafes, ongoing events, etc. Entities specialized in various areas of interest…

  • .NET Projects - cloud Computing

    Secure kNN Query Processing in Untrusted Cloud Environments

    0 out of 5
    4,500

    Secure kNN Query Processing in Untrusted Cloud Environments   Abstract? Secure kNN Query Processing in Untrusted Cloud Environments. Mobile devices with geo-positioning capabilities (e.g., GPS) enable users to access information that is relevant to their present location. Users are interested in querying about points of interest (POI) in their physical proximity, such as restaurants, cafes,…

End of content

End of content