Skip to main content
Secure distributed data storage can shift the burden of maintaining a large number of files from the owner to proxy servers. Proxy servers can convert encrypted files for the owner to encrypted files for the receiver without the necessity... more
    • by 
    •   2  
      Secure Cloud ComputingSecure Computing
A number of studies on privacy-preserving data mining have been proposed. Most of them assume that they can separate quasi-identifiers (QIDs) from sensitive attributes. For instance, they assume that address, job, and age are QIDs but are... more
    • by 
    •   2  
      Secure Cloud ComputingSecure Computing
11 th International Conference on Cryptography and Information Security (CRYPIS 2022) focuses on cutting-edge results in Applied Cryptography and Information security. It aims to bring together scientists, researchers and students to... more
    • by 
    •   7  
      Fuzzy SystemsSecurity ManagementSecurity EngineeringSecure Cloud Computing
International Journal of Wireless Network Security (IJWNS) http://flyccs.com/jounals/IJWNS/Home.html Scope International Journal of Wireless Network Security (IJWNS) is a open access journal that publishes articles which contribute... more
    • by 
    •   15  
      Security ManagementBorder Managment, Migration and Border Management, Migration and SecuritySecure Cloud ComputingInformation Security Management
11 th International Conference on Cryptography and Information Security (CRYPIS 2022) focuses on cutting-edge results in Applied Cryptography and Information security. It aims to bring together scientists, researchers and students to... more
    • by 
    •   5  
      Fuzzy SystemsSecurity EngineeringSecure Cloud ComputingData Integrity
10th International Conference on Cryptography and Information Security (CRYPIS 2021) focuses on cutting-edge results in Applied Cryptography and Information security. It aims to bring together scientists, researchers and students to... more
    • by 
    •   19  
      Grid ComputingInformation SecuritySoftware SecurityMobile Distributed Systems
To buy this project in ONLINE, Contact: Email: jpinfotechprojects@gmail.com, Website: https://www.jpinfotech.org A Hybrid E-learning Recommendation Approach Based on Learners' Influence Propagation In e-learning recommender systems,... more
    • by 
    •   8  
      Image ProcessingData MiningSocial NetworkingCloud Computing
Security has been considered as the key concern of adopting cloud computing. This could be ascribed to the customers’ lack of control over their confidential data once in the cloud and to the absence of trust in cloud providers.... more
    • by 
    •   3  
      Cloud ComputingSecure Cloud ComputingCloud Computing Security
The multihop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks... more
    • by 
    •   2  
      Secure Cloud ComputingSecure Computing
With the expanding interest for constant applications in the Wireless Senor Network (WSN), ongoing discriminating occasions suspect a proficient quality-of-service (QoS) based Routing for information conveyance from the Network... more
    • by 
    •   2  
      Computer NetworksSecure Cloud Computing
Cloud computing is quickly becoming the platform of choice for many web services. Virtualization is the key underlying technology enabling cloud providers to host services for a large number of customers. Unfortunately, virtualization... more
    • by 
    •   9  
      Computer ScienceComputer ArchitectureInformation SecurityComputer Engineering
Security has been considered as the key concern of adopting cloud computing. This could be ascribed to the customers' lack of control over their confidential data once in the cloud and to the absence of trust in cloud providers.... more
    • by 
    •   6  
      Computational ModelingCloud ComputingStorage Area NetworksSecure Cloud Computing
Intentional or unintentional leakage of confidential data is undoubtedly one of the most severe security threats that organizations face in the digital era. The threat now extends to our personal lives: a plethora of personal information... more
    • by 
    •   2  
      Secure Cloud ComputingSecure Computing
Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most... more
    • by 
    •   2  
      Secure Cloud ComputingSecure Computing
Online social networks gradually integrate financial capabilities by enabling the usage of real and virtual currency. They serve as new platforms to host a variety of business activities such as online promotion events, where users can... more
    • by 
    •   2  
      Secure Cloud ComputingSecure Computing
International Journal on Cryptography and Information Security ( IJCIS) is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography and Information security.
    • by 
    •   2  
      Secure Cloud ComputingInformation Security Management
Data outsourcing allows data owners to keep their data in public clouds, which do not ensure the privacy of data and computations. One fundamental and useful framework for processing data in a distributed fashion is MapReduce. In this... more
    • by  and +1
    •   10  
      Information SecurityDatabase SystemsComputer SecurityCloud Computing
Model combination in classification, density estimation and clustering and forecasting has become a promising research area where better results are obtained compared to using single models. Bayesian inference offers two approaches for... more
    • by 
    •   4  
      Deep LearningSecure Cloud ComputingAIMLTime Series Forecasting
International Journal of Wireless Network Security (IJWNS) http://flyccs.com/jounals/IJWNS/Home.html Scope International Journal of Wireless Network Security (IJWNS) is a open access journal that publishes articles which contribute... more
    • by 
    •   15  
      Genetic Fuzzy SystemsFuzzy SystemsFuzzy Expert SystemsFuzzy and Neuro-Fuzzy Systems
Cloud computing is quickly becoming the platform of choice for many web services. Virtualization is the key underlying technology enabling cloud providers to host services for a large number of customers. Unfortunately, virtualization... more
    • by 
    •   15  
      Computer ScienceComputer ArchitectureInformation SecurityComputer Engineering
An algorithm for anonymous sharing of private data among parties is developed. This technique is used iteratively to assign these nodes ID numbers ranging from 1 to N. This assignment is anonymous in that the identities received are... more
    • by 
    •   2  
      Secure Cloud ComputingSecure Computing
Cloud security is one of most important issues that have attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy... more
    • by 
    •   3  
      SecuritySecure Cloud ComputingSecure Computation
Photo sharing is an attractive feature which popularizes Online Social Networks (OSNs). Unfortunately, it may leak users' privacy if they are allowed to post, comment, and tag a photo freely.we attempt to address this issue and study the... more
    • by 
    •   2  
      Secure Cloud ComputingSecure Computation
Broadcast encryption (BE) schemes allow a sender to securely broadcast to any subset of members but require a trusted party to distribute decryption keys. Group key agreement (GKA) protocols enable a group of members to negotiate a common... more
    • by 
    •   2  
      Secure Cloud ComputingSecure Computing
Understanding the spreading dynamics of computer viruses (worms, attacks) is an important research problem, and has received much attention from the communities of both computer security and statistical physics. However, previous studies... more
    • by 
    •   2  
      Secure Cloud ComputingSecure Computing
Model combination in classification, density estimation and clustering and forecasting has become a promising research area where better results are obtained compared to using single models. Bayesian inference offers two approaches for... more
    • by 
    •   3  
      Deep LearningSecure Cloud ComputingTime Series Forecasting
Social network is a group of individuals with diverse social interactions amongst them. The network large scale and distributed due to Quantitative analysis of networks is need of and in turn the society. Clustering helps us to group... more
    • by 
    •   12  
      Software SecurityNetwork SecurityWireless Sensor NetworksGenetic Fuzzy Systems