Segmentation often is used as a pre-processing step before higher level image processing or understanding. Manually segmenting images can be laborious and time-consuming, especially for large images, and can be prone to subjectivity. At the same time, developing a generic unsupervised segmentation algorithm that can be accurately applied to all, or even many, types of […]
A MEDIATED CERTIFICATELESS ENCRYPTION SCHEME FOR SECURELY SHARING SENSITIVE INFORMATION IN PUBLIC CLOUDS
In this abstract, we propose a new mCL-PKE scheme. We present the formal security model and provide the security proof. Since our mCL-PKE scheme does not depend on the pairing-based operation, it reduces the computational overhead. Moreover, we introduce an extension of mCL-PKE scheme to efficiently encrypt data for multiple users. We propose a novel […]
ENHANCING THE QOS SUPPORT CAPABILITY OF HYBRID NETWORKS USING QOS-ORIENTED DISTRIBUTED ROUTING PROTOCOL
The emergence and the envisioned future of real time and multimedia applications have stimulated the need of high Quality of Service (QoS) support in wireless and mobile networking environments. The QoS support reduces end-to-end transmission delay and enhances throughput to guarantee the seamless communication between mobile devices and wireless infrastructures. In order to enhance the […]
MCLPKE SCHEME WITHOUT USING PAIRING OPERATIONS FOR SECURE DATA SHARING IN PUBLIC CLOUDS
An advantage of using a public cloud for storage is that the provider is responsible for building and maintaining the storage infrastructure and its associated costs including power, cooling and server maintenance. We propose a mediated certificateless encryption scheme without pairing operations for securely sharing sensitive information in public clouds. Mediated certificateless public key encryption […]
ENHANCING THE QOS SUPPORT CAPABILITY OF HYBRID NETWORKS USING QOS-ORIENTED DISTRIBUTED ROUTING PROTOCOL
The emergence and the envisioned future of real time and multimedia applications have stimulated the need of high Quality of Service (QoS) support in wireless and mobile networking environments. The QoS support reduces end-to-end transmission delay and enhances throughput to guarantee the seamless communication between mobile devices and wireless infrastructures. In order to enhance the […]
TRUSTEE-BASED SOCIAL AUTHENTICATIONS SYSTEMS FOR SECURITY
In this abstract, we aim to provide systematic study about the security of trustee-based social authentications. To this end, we first propose a novel framework of attacks that are based on the observation that users’ security are correlated in trustee-based social authentications. In these attacks, an attacker initially obtains a small number of compromised users […]
HYBRID WIRELESS NETWORKS WITH QOD ROUTING PROTOCOL
In order to enhance the QoS support capability of hybrid wireless networks, in this abstract, we propose a QoS-Oriented Distributed routing protocol (QOD). Taking advantage of fewer transmission hops and any cast transmission features of the hybrid networks, QOD transforms the packet routing problem to a resource scheduling problem. QOD incorporates five algorithms: 1) a […]
SECURITY OF TRUSTEE-BASED SOCIAL AUTHENTICATIONS AGAINST FOREST FIRE ATTACK
Trustee-based social authentication has attracted increasing attentions and has been shown to be a promising backup authentication mechanism . Specifically, a user’s security in trustee-based social authentications relies on the security of his or her trustees; if all trustees of a user are already compromised, then the attacker can also compromise him or her because […]
CLOUD COMPUTING WITH SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL
In our model, privacy is accomplished by encrypting the data it can prevent the un authorized access. We are going to raise the privacy level of the data owner and the confidentiality of the data by providing access to users. Here we proposed the secured system and data owner can decide whether the user can […]
BROKER-LESS PUBLISH/SUBSCRIBE SYSTEMS WITH IDENTITY-BASED ENCRYPTION
In publish/subscribe (pub/sub) communication, Publishers inject information into the pub/sub system, and subscribers specify the events of interest by means of subscriptions. Published events are routed to their relevant subscribers, without the publishers knowing the relevant set of subscribers, or vice versa. This abstract presents a novel approach to provide confidentiality and authentication in a […]
- « Previous Page
- 1
- …
- 6
- 7
- 8
- 9
- 10
- …
- 21
- Next Page »