Security Projects
ID-Based Cryptography and Remote Data Checking for Secure Cloud Data Storage
The massive technological advancements in world exchange and the necessity for individual informatio..
A flexible approach to improving system reliability with virtual Lockstep
—There is an increasing need for fault tolerance capabilities in logic devices brought about by the ..
A taxonomy of buffer overflow characteristics
Thus the work flow mainly focuses to the buffer overflow. In which the data exceeding the bounds of ..
An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming
An intrusion detection system (IDS) is a device or software application that monitors network and/or..
CAM: CLOUD-ASSISTED PRIVACY PRESERVING MOBILE HEALTH MONITORING
ABSTRACT: Here we want to know about the health care services and cloud based technologies. The ..
Efficient MAC enforcement approach for intruders in commercial operating system
When malware is present inside the operating system the MAC works to prevent them but resulting t..
ENCRYPTION FOR HIGH EFFICIENCY VIDEO CODING WITH VIDEO ADAPTATION CAPABILITIES
Abstract: A systematic procedure for designing video adaptation framework involves identifying ..
Fingerprinting Mobile User Positions in Sensor Networks: Attacks and Countermeasures.
We demonstrate that the network flux over the sensor network provides fingerprint information about ..
GIVE 2 GET FORWARDING IN SOCIAL MOBILE WIRELESS N/W OF SELFISH NODES
In this paper, we present two forwarding protocols for mobile wireless networks of selfish individua..
heap graph based software theft detection
As JavaScript is becoming more and more popular, JavaScript programs are valuable assets to many co..
Human Effects of Enhanced Privacy M anagement Models
This project enhances existing system and introduces new social network privacy management models. A..
KEY MANAGEMENT FOR MULTIPLE MULTICAST GROUPS IN WIRELESS NETWORKS
Abstract With the emergence of diverse group-based services, multiple multicast groups are likel..
LDTS: A LIGHTWEIGHT AND DEPENDABLE TRUST SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKS
Abstract: In this Paper,propos..
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
ABSTRACT: Cloud security is one of most important issues that have attracted a lot of research ..
On privacy of speech communication
A speech communication is the one of the major communication between the humans. Secure speech commu..