Now showing items 1-20 of 20

    • Auditing access to private DATA by android applications 

      Rangnath, Maral Vishal (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      "The capabilities of the mobile device are extended in various useful by Android applications. But with the usefulness and swift advancement of Android, its security issues have also become more and more alarming. The more ...
    • Design and Analysis of Privacy Models against Background Knowledge in Privacy - Preserving Data Publishing 

      Desai, Nidhi Nitin (Dhirubhai Ambani Institute of Information and Communication Technology, 2021)
      "Humongous amount of data gets collected by various online applications like social networks, cellular technologies, the healthcare sector, location - based services, and many more. The collected data can be accessed by ...
    • Design and analysis of schemes for privacy preserving cloud storage services 

      Chaudhari, Payal (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
      Public cloud storage services have become the leading choice for individuals and organizations to store their data, as the service provides the benefits of availability and reliability together at a reduced cost. While ...
    • Image authentication using genetic algorithm 

      Londhey, Arjun (Dhirubhai Ambani Institute of Information and Communication Technology, 2016)
      With a widespread deployment of digital images, there is need to authenticatesuch images for their originality and integrity.The main objective of the work is todesign an authentication scheme that allows two parties to ...
    • Medical image security with cheater identification using secret sharing scheme 

      Krishnan, Arun (Dhirubhai Ambani Institute of Information and Communication Technology, 2015)
      The progress in the field of information and communication technology has brought about quick and efficient transfer of textual as well as multimedia data . However, the growth of technology has also provided new ways ...
    • On insider attack in distributed file systems 

      Solani, Riddhi (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
      Due to heavy use of internet, mobiles, sensors etc. Data is growing rapidly day-by-day. However traditional database systems fail to store such a huge semi structured or unstructured data which raises the need for distributed ...
    • On Minimality Attack in Privacy Preserving Data Publishing 

      Hemantha, K. (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      "Data Publishing has become much concern in recent yerars for protecting the individual privacy. Information about the individuals is collected from various domain and is being published public. We can extract lot of wealth ...
    • Privacy and accountability in cloud computation and storage 

      Gajera, Hardik (Dhirubhai Ambani Institute of Information and Communication Technology, 2021)
      Cloud computing is a cost-effective computing paradigm for convenient, ondemand data access to a shared pool of configurable computing resources such as networks, servers, storage, applications, and services. While providing ...
    • Privacy preservation in vehicular ad-hoc networks (VANETs) 

      Garg, Garima (Dhirubhai Ambani Institute of Information and Communication Technology, 2015)
      Vehicular Ad-hoc Networks (VANETs) are the special application of Mobile Ad-hoc Networks (MANETs). Due to increase in the number of road accidents, VANETs provide security to road traffic by sending safety messages to other ...
    • Privacy Preserving Identity Verification and Verifiable Computation For HealthCare System 

      Naik, Shruti Rajendrakumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      Paper based medical consulting system has been replaced by electronic health monitoring system due to features like low cost, on demand global accessibility, reliability, accuracy and mobility. Generally, mobile healthcare ...
    • Privacy preserving identity verification with binding blinding technique in cloud assisted healthcare applications 

      Patwa, Dolly R. (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
      In recent times, broad deployment of computers and mobile devices such as mobile phones, PDA's rigged with cost efficient sensors, have shown great potential in recognizing positive direction to healthcare services. It ...
    • Private targeted advertising using homomorphic encryption 

      Dave, Ainish Juotindra (Dhirubhai Ambani Institute of Information and Communication Technology, 2016)
      Privacy of the user data in online setup is an important feature. The users of Internetdo not want to share their private information or interests with anybody.The targeted advertising domain clearly tracks the user activity ...
    • Secure and efficient dealing with node capture attack in wireless sensor networks 

      Agrawal, Sarita (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      Wireless Sensor Networks (WSN) have found enormous applications in various areas of day-to-day life such as in health-care, battle-field surveillance and disaster management. The communication amongst the sensor nodes ...
    • Secure data delivery in mobile ad hoc network using multiple paths 

      Maheshwari, Mayur (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      A mobile ad hoc network (MANET) is a self configurable, self organized, infrastructure less multi hop mobile wireless network.Characteristics of ad hoc network make security a critical issue i.e. any node can join the ...
    • Secure SQL with access control for database as a service model 

      Dave, Jay (Dhirubhai Ambani Institute of Information and Communication Technology, 2014)
      Rapid growth of internet and networking technology emerges "Software as a service model". In this model, application service providers (ASP) provides each functionality of software over internet. ASP provides access of ...
    • Security of remote car locking system against eavesdropping 

      Patel, Jinita (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
      Vehicle industry is growing rapidly. To sustain in the market manufacturer uses various technology in vehicles. In today's world users need more comfort in addition to efficiency of vehicles. With the advancement in the ...
    • Tampered Image Detection using SVM Classifier 

      Patel, Dhwani (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      "Steganography is the process of hiding confidential information in image such that contents of original image remain unaltered. Hence steganalysis algorithms used to detect such data embedding needs to be designed. In ...
    • Two phase automated tellar machine transaction for visually impaired 

      Panchal, Krunal (Dhirubhai Ambani Institute of Information and Communication Technology, 2016)
      Voice guided Automated Teller Machine(ATM) are the type of ATM which letsvisually impaired people access the ATM services. Blind users insert wired Headsetsinto audio output jack on the ATM machine and ATM starts Interactive ...
    • Verifiable conjunctive keyword search using authenticated crawlers 

      Sharma, Ritu (Dhirubhai Ambani Institute of Information and Communication Technology, 2016)
      Authenticity of search results corresponding to the user�s query is an importantrequirement in public cloud as massive data are being generated from differentsources frequently. There is a constant rise in the trust issues ...
    • Wireless LAN 802.11 security using elliptic curve cryptography 

      Singh, Saurabh (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      IEEE 802.11 is a standard defines the specification of Wireless Local Area Network (WLAN), came into existence in 1997. As communication medium is wireless, security is a major concern to protect the data from adversary. ...