Hi there! Click one of our representatives below and we will get back to you as soon as possible.

Security Projects

star_border star_border star_border star_border star_border

ID-Based Cryptography and Remote Data Checking for Secure Cloud Data Storage

The massive technological advancements in world exchange and the necessity for individual informatio..

4,500.00INR
star_border star_border star_border star_border star_border

A flexible approach to improving system reliability with virtual Lockstep

—There is an increasing need for fault tolerance capabilities in logic devices brought about by the ..

2,500.00INR
star_border star_border star_border star_border star_border

A taxonomy of buffer overflow characteristics

Thus the work flow mainly focuses to the buffer overflow. In which the data exceeding the bounds of ..

2,500.00INR
star_border star_border star_border star_border star_border

An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming

An intrusion detection system (IDS) is a device or software application that monitors network and/or..

2,500.00INR
star_border star_border star_border star_border star_border

CAM: CLOUD-ASSISTED PRIVACY PRESERVING MOBILE HEALTH MONITORING

ABSTRACT: Here we want to know about the health care services and cloud based technologies. The ..

4,500.00INR
star_border star_border star_border star_border star_border

Efficient MAC enforcement approach for intruders in commercial operating system

 When malware is present inside the operating system the MAC works to prevent them but resulting t..

2,500.00INR
star_border star_border star_border star_border star_border

ENCRYPTION FOR HIGH EFFICIENCY VIDEO CODING WITH VIDEO ADAPTATION CAPABILITIES

Abstract: A systematic procedure for designing video adaptation framework involves identifying ..

4,500.00INR
star_border star_border star_border star_border star_border

Fingerprinting Mobile User Positions in Sensor Networks: Attacks and Countermeasures.

We demonstrate that the network flux over the sensor network provides fingerprint information about ..

2,500.00INR
star_border star_border star_border star_border star_border

GIVE 2 GET FORWARDING IN SOCIAL MOBILE WIRELESS N/W OF SELFISH NODES

In this paper, we present two forwarding protocols for mobile wireless networks of selfish individua..

2,500.00INR
star_border star_border star_border star_border star_border

heap graph based software theft detection

As JavaScript is becoming more and more popular, JavaScript programs are valuable assets to many co..

2,500.00INR
star_border star_border star_border star_border star_border

Human Effects of Enhanced Privacy M anagement Models

This project enhances existing system and introduces new social network privacy management models. A..

3,000.00INR
star_border star_border star_border star_border star_border

KEY MANAGEMENT FOR MULTIPLE MULTICAST GROUPS IN WIRELESS NETWORKS

Abstract With the emergence of diverse group-based services, multiple multicast groups are likel..

4,500.00INR
star_border star_border star_border star_border star_border

LDTS: A LIGHTWEIGHT AND DEPENDABLE TRUST SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKS

Abstract:             In this Paper,propos..

4,500.00INR
star_border star_border star_border star_border star_border

NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

ABSTRACT: Cloud security is one of most important issues that have attracted a lot of research ..

4,500.00INR
star_border star_border star_border star_border star_border

On privacy of speech communication

A speech communication is the one of the major communication between the humans. Secure speech commu..

2,500.00INR
Showing 1 to 15 of 23 (2 Pages)
LiveZilla Live Chat Software
Free Website Hit Counter
Free website hit counter