Showing 745–756 of 3871 results

  • Attribute Couplet Attacks and Privacy Preservation in Social Networks

    Attribute Couplet Attacks and Privacy Preservation in Social Networks

    0 out of 5
    4,500

    Attribute Couplet Attacks and Privacy Preservation in Social Networks Abstract-The emerging of social networks, e.g., Facebook, Twitter, Instagram has eventually changed the way in which we live. Social networks are acquiring and storing a significant amount of profile information and daily activities of over billions of active users. The datasets, drawn from the social networks,…

  • Attribute-based Access Control for ICN Naming Scheme

    Attribute-based Access Control for ICN Naming Scheme

    0 out of 5
    5,500

    Attribute-based Access Control for ICN Naming Scheme Abstract? Information Centric Networking (ICN) is a new network architecture that aims to overcome the weakness of existing IPbased networking architecture. Instead of establishing a connection between the communicating hosts, ICN focuses on the content, i.e. data, transmitted in network. Content copies in ICN can be cached at…

  • Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing

    Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing

    0 out of 5
    4,500

    Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing Abstract? With the popularity of cloud computing, there have been increasing concerns about its security and privacy. Since the cloud computing environment is distributed and untrusted, data owners have to encrypt outsourced data to enforce confidentiality. Therefore, how to achieve practicable access control of encrypted data…

  • Dotnet-Cloud Computing

    Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing

    0 out of 5
    4,500

    Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing Abstract? With the popularity of cloud computing, there have been increasing concerns about its security and privacy. Since the cloud computing environment is distributed and untrusted, data owners have to encrypt outsourced data to enforce confidentiality. Therefore, how to achieve practicable access control of encrypted data…

  • .NET Projects - cloud Computing

    Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks

    0 out of 5
    4,500

    Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks   Abstract? a novel Multi-message Ciphertext Policy Attribute-Based Encryption (MCP-ABE) technique, and employs the MCP-ABE to design an access control scheme for sharing scalable media based on data consumers’ attributes (e.g., age, nationality, or gender) rather than an explicit list of the consumers’ names. <…

  • .NET Projects - cloud Computing

    Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks

    0 out of 5
    4,500

    Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks Abstract? Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″…

  • Attribute-Based Data Sharing Scheme Revisited in Cloud Computing

    Attribute-Based Data Sharing Scheme Revisited in Cloud Computing

    0 out of 5
    5,500

    Attribute-Based Data Sharing Scheme Revisited in Cloud Computing Abstract?Abstract Ciphertext-policy attribute-based encryption (CPABE) is a very promising encryption technique for secure data sharing in the context of cloud computing. Data owner is allowed to fully control the access policy associated with his data which to be shared. However, CP-ABE is limited to a potential security…

  • Attribute-Based Encryption With Verifiable Outsourced Decryption

    Attribute-Based Encryption With Verifiable Outsourced Decryption

    0 out of 5
    4,500

    Attribute-Based Encryption With Verifiable Outsourced Decryption Abstract? Attribute-Based Encryption With Verifiable Outsourced Decryption. Attribute-based encryption (ABE) is a public-key-based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promising application of ABE is flexible access control of encrypted data stored in the cloud, using access polices and ascribed attributes…

  • Product on sale
    Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud

    Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud

    0 out of 5
    Original price was: ₹7,000.Current price is: ₹5,500.

    Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud Abstract-Attribute-based encryption (ABE) has been widely used in cloud computing where a data provider outsources his/her encrypted data to a cloud service provider, and can share the data with users possessing specific credentials (or attributes). However, the standard ABE system does not support secure deduplication,…

  • Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud

    Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud

    0 out of 5
    4,500

    Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud Abstract-Attribute-based encryption (ABE) has been widely used in cloud computing where a data provider outsources his/her encrypted data to a cloud service provider, and can share the data with users possessing specific credentials (or attributes). However,the standard ABE system does not support secure deduplication, which…

  • Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud

    Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud

    0 out of 5
    4,500

    Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud Abstract– Attribute-based encryption (ABE) has been widely used in cloud computing where a data provider outsources his/her encrypted data to a cloud service provider, and can share the data with users possessing specific credentials (or attributes). However, the standard ABE system does not support secure…

  • Auction Bidding Mangement System

    Auction Bidding Mangement System

    0 out of 5
    4,500

    Auction Bidding Mangement System Abstract-An Auction Bidding management system is a system that holds auctions for various products on an application and serves bidders accordingly. The system is designed to allow users to view their products for auctions and to register and bid for various products available for bidding. The system also consists of products…

End of content

End of content