ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Pure sciences
Industrial engineer
Mechanical Engineering

Languages

Countries
India

Years
2020
2019
2018

Filter  
 
11  Articles
1 of 2 pages  |  10  records  |  more records»
This work proposes a useful Ciphertext-Policy Attribute-Based Hierarchical archive grouping Encryption plan named CP-ABHE. By sensible, we infer that CP-ABHE is progressively powerful in both calculation and additional room without surrendering informatio... see more

Distributed computing is a promising IT framework that can make a ton out of IT resources in a profitable and versatile manner. Continuously different associations plan to move their close by information the board systems to the cloud and store and manage... see more

A cloud-based big data sharing system uses a storage facility from a cloud specialist co-op to impart data to authentic clients. As opposed to customary arrangements, cloud supplier stores the mutual data in the huge server farms outside the trust area of... see more

Normally with limited bandwidth capacity and limited battery life, these issues acquaint substantial overhead with registering and correspondence just as a higher power utilization for cell phone clients, which makes the encrypted search over mobile cloud... see more

We initially propose an adaptable structure where user can utilize his property estimations and a hunt search to locally determine pursuit ability, and a record can be recovered just when its keywords coordinate the query and the user's trait esteems can ... see more

Credit card fraud is a difficult issue in budgetary services. Billions of dollars are lost because of credit card fraud consistently. There is an absence of research thinks about on investigating genuine Master card data inferable from secrecy issues. In ... see more

We present a hybrid methodology for recognizing computerized spammers by amalgamating network based highlights with other element classifications, specifically metadata-, content-, and collaboration based highlights. The curiosity of the proposed methodol... see more

Secure routing and communication security protocols can be combined and applied on the messages to deliver them with complete shielding. The custom of communication security protocols initially advanced for wire line and Wi-Fi networks can also present a ... see more

SocialQ&A powers the social network possessions of common-interest and mutual-trust friend association to classify an asker through friendship that are most probable to answer the question, and improve the user security. We also recover SocialQ&A with saf... see more

1 of 2 pages  |  10  records  |  more records»