- Filter by:
-
Content Type
-
Topic
-
Ascendable Information Sharing in Cloud Storage by Using Key-Aggregate Cryptosystem
Cloud computing is employed to store and share knowledge by anyone from any place within the world. Cloud storage having important functionality i.e., securely, efficiently, flexibly share data with others. The authors explain new public-key cryptosystems which produce constant size cipher text. In this, they describe a cryptographic technique in...
Download Now -
Data Deduplication in Cloud Storage
The use of cloud for storing data by companies for backup and common people for sharing information among friends has increased drastically over the past few years. With an increase in the usage of cloud storage, effective methods need to be employed to reduce hardware costs, meet the bandwidth requirements...
Download Now -
Sharing the Secure Data in the Cloud for Multi User Group
Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this paradigm also brings forth many new challenges for data security and access control when users confidential against untrusted servers, existing solutions usually apply...
Download Now -
Decentralized Access Controls in Disruption Tolerant Networks
Portable nodes in military environments, for example, a front line or an antagonistic area are prone to experience the undergo of irregular system network and frequent partitions. Interruption Tolerant Network (ITN) innovations are getting to be fruitful results that permit remote device conveyed by officers to speak with one another...
Download Now -
Wireless Sensor Networks: A Perspective to Time Synchronization
Wireless sensor networks are getting lot of attention by the research community. It consists of small devices distributed over geographical areas and each device has sensing, computing and communicating components. Time synchronization targets at equalizing the local times for all nodes in the network. It has been observed from the...
Download Now -
Comparison Study on Availability Enhancement of Data in MANET using Replication Techniques
Mobile Ad hoc NETwork (MANET) does not require any predefined infrastructure and it is self-configuring network of mobile hosts associated without wires. MANET has less processing ability and because of mobility of hosts there is change in network topology. In MANET's nodes are free to move independently and sometimes node...
Download Now -
Captcha as Graphical Passwords (CaRP) - A Novel Security Approach Based on Hard AI Problems
User authentication has become one of the important topics in information security. Many graphical password schemes have been proposed, which are used to improve password usability and security. In this paper, the authors present a new approach to solve the hard AI problems, namely, graphical passwords are combined with Captcha...
Download Now -
A Survey on Graphical Passwords in Providing Security
Cyber security is an important issue to tackle. Various user authentication methods are used for this purpose. It helps to avoid misuse or illegal use of highly sensitive data. Text and graphical passwords are mainly used for authentication purpose. But due to various flaws, they are not reliable for data...
Download Now -
Literature Survey on Secure Efficient Data Transmission for Cluster based Wireless Sensor Networks
Secure data transmission is a critical issue for Wireless Sensor Networks (WSNs). Clustering is an effective and practical way to enhance the system performance of WSNs. In recent years, wireless communication due to rapid hardware cost reduction and providing its devices with portability has become one of the most important...
Download Now -
A Survey Paper on MONA: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this paradigm also brings forth many new challenges for data security and access control when users confidential against untrusted servers, existing solutions usually apply...
Download Now