Phd Projects Research centers in Chennai, Bangalore (Bengaluru), Computer Networking, Mobile Computing, Data Mining, Image Processing, Cloud Computing, Software Engineering, Web Services, Hyderabad, Pune, Mumbai, Kovai, Salem, Namakkal, Tanjore (Thanjavur), Karur, Pudukkottai, Tiruppur, Erode, Tirunelveli, Dindigul, Vellore, Tirupati, Chittoor, Thoothukudi, Kanyakumari, Titles, Topics, Proposal, Ph.D Thesis. SEABIRDS SOLUTION is one of the leading Research & […]
RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage
Data access control is a challenging issue in public cloud storage systems. Ciphertext-policy attribute-based encryption (CP-ABE) has been adopted as a promising technique to provide flexible, fine-grained, and secure data access control for cloud storage with honest-but-curious cloud servers. However, in the existing CP-ABE schemes, the single attribute authority must execute the time-consuming user legitimacy […]
Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds
Cloud storage system provides facilitative file storage and sharing services for distributed clients. To address integrity, controllable outsourcing, and origin auditing concerns on outsourced files, we propose an identity-based data outsourcing (IBDO) scheme equipped with desirable features advantageous over existing proposals in securing outsourced data. First, our IBDO scheme allows a user to authorize dedicated […]
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage
Remote data integrity checking (RDIC) enables a data storage server, say a cloud server, to prove to a verifier that it is actually storing a data owner’s data honestly. To date, a number of RDIC protocols have been proposed in the literature, but most of the constructions suffer from the issue of a complex key […]
Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving
Industries and individuals outsource database to realize convenient and low-cost applications and services. In order to provide sufficient functionality for SQL queries, many secure database schemes have been proposed. However, such schemes are vulnerable to privacy leakage to cloud server. The main reason is that database is hosted and processed in cloud server, which is […]
Privacy-Preserving Image Denoising From External Cloud Databases
Along with the rapid advancement of digital image processing technology, image denoising remains a fundamental task, which aims to recover the original image from its noisy observation. With the explosive growth of images on the Internet, one recent trend is to seek high quality similar patches at cloud image databases and harness rich redundancy therein […]
MasterPrint: Exploring the Vulnerability of Partial Fingerprint-Based Authentication Systems
This paper investigates the security of partial fingerprint-based authentication systems, especially when multiple fingerprints of a user are enrolled. A number of consumer electronic devices, such as smartphones, are beginning to incorporate fingerprint sensors for user authentication. The sensors embedded in these devices are generally small and the resulting images are, therefore, limited in size. […]
JPEG Quantization Step Estimation and Its Applications to Digital Image Forensics
The goal of this paper is to propose an accurate method for estimating quantization steps from an image that has been previously JPEG-compressed and stored in lossless format. The method is based on the combination of the quantization effect and the statistics of discrete cosine transform (DCT) coefficient characterized by the statistical model that has […]
BASIS: A Practical Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks
Multi-user broadcast authentication is an important security service in wireless sensor networks (WSNs), as it allows a large number of mobile users of the WSNs to join in and broadcast messages to WSNs dynamically and authentically. To reduce communication cost due to the transmission of public-key certificates, broadcast authentication schemes based on identity (ID)- based […]
GDVAN: A New Greedy Behavior Attack Detection Algorithm for VANETs
Vehicular Ad hoc Networks (VANETs), whose main objective is to provide road safety and enhance the driving conditions, are exposed to several kinds of attacks such as Denial of Service (DoS) attacks which affect the availability of the underlying services for legitimate users. We focus especially on the greedy behavior which has been extensively addressed […]
- 1
- 2
- 3
- …
- 108
- Next Page »