Showing 3289–3300 of 3871 results

  • Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks

    Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks

    0 out of 5
    4,500

    Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks Abstract? Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential to be authenticated by multiple service providers in a distributed computer network. Recently, Chang and Lee proposed a new SSO scheme and claimed its security by…

  • .NET Projects - cloud Computing

    Security and Privacy Enhancing in Multi cloud Architecture

    0 out of 5
    4,500

    Security and Privacy Enhancing in Multi cloud Architecture   Abstract? Security and Privacy Enhancing in Multi cloud Architecture Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no”…

  • Java Projects — Cloud Computing

    Security and privacy for storage and computation in cloud computing

    0 out of 5
    4,500

    Security and privacy for storage and computation in cloud computing   Abstract? Security and privacy for storage and computation in cloud computing. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections…

  • Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control

    Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control

    0 out of 5
    4,500

    Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control Abstract-With the rapid development of the Internet of Things (IoT) and cloud computing technologies, smart health (shealth) is expected to significantly improve the quality of health care. However, data security and user privacy concerns in shealth have not been adequately addressed. As a well-received…

  • Security and Privacy of Connected Vehicular Cloud Computing

    Security and Privacy of Connected Vehicular Cloud Computing

    0 out of 5
    4,500

    Security and Privacy of Connected Vehicular Cloud Computing Abstract-As vehicular equipment is becoming more and more intelligent, the vehicular information service, as the main means of capturing information, has been far from able to meet the needs of occupants [1, 2]. Cloud computing, with its powerful computing and storage capabilities, convenient network access, energy saving…

  • Security and Privacy-Enhancing Multicloud Architectures

    Security and Privacy-Enhancing Multicloud Architectures

    0 out of 5
    4,500

    Security and Privacy-Enhancing Multicloud Architectures Abstract? Security and Privacy-Enhancing Multicloud Architectures. Security challenges are still among the biggest obstacles when considering the adoption of cloud services. This triggered a lot of research activities, resulting in a quantity of proposals targeting the various cloud security threats. Alongside with these security issues, the cloud paradigm comes with…

  • Java Projects—Data Mining

    Security as a Service Model for Cloud Environment

    0 out of 5
    4,500

    Security as a Service Model for Cloud Environment Abstract?Cloud computing is becoming increasingly important for provision of services and storage of data in the Internet. However there are several significant challenges in securing cloud infrastructures from different types of attacks. The focus of this paper is on the security services that a cloud provider can…

  • Java Projects — Cloud Computing

    Security challenges in vehicular Cloud

    0 out of 5
    4,500

    Security challenges in vehicular Cloud   Abstract? In a series of recent papers, Prof. Olariu and his co-workers have promoted the vision of vehicular clouds (VCs), a nontrivial extension, along several dimensions, of conventional cloud computing. In a VC, underutilized vehicular resources including computing power, storage, and Internet connectivity can be shared between drivers or…

  • Java Projects—Data Mining

    Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning

    0 out of 5
    4,500

    Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning Abstract?The distinctive features of mobile ad hoc networks (MANETs), including dynamic topology and open wireless medium, may lead to MANETs suffering from many security vulnerabilities. In this paper, using recent advances in uncertain reasoning that originated from the artificial intelligence community, we…

  • Java_wireless

    Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning

    0 out of 5
    4,500

    Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning Abstract?The distinctive features of mobile ad hoc networks< Final Year Projects 2016 > including dynamic topology and open wireless medium, may lead to MANETs suffering from many security vulnerabilities. In this paper, using recent advances in uncertain reasoning that originated from the…

  • Security Management System

    Security Management System

    0 out of 5
    5,500

    Security Management System Abstract-In the first place, earlier days security guards used to store the data in the form of files, registers etc., which includes entirely manual operations. Due to this there were chances of misplacement or corruption of data and it is very hard to track thedata .Suppose crime or theft accrue means all…

  • Matlab_Dip

    Security system based on Viola Jones Detection

    0 out of 5
    4,500

    Security system based on Viola Jones Detection   Abstract? ris recognition is a biometric system for access control that uses the most unique characteristic of the human body, the irisemployed in automated border crossings, nationalID systems,etc.< Final Year Projects >This paper illustrates techniquesto improve performance of iris recognition system based onstationary images using NI LabVIEW(Vision…

End of content

End of content