Now showing items 1-4 of 4

    • Malicious Node Detection for various Heterogenous IoT Communication Protocols 

      Mekala, Priyanka; Goel, Supriya (2021)
      In recent years security is an increased concern for IoT devices. Due to limited capabilities compared to traditional computer systems, these tiny devices cannot run the heavy encryption algorithms required for preventing ...
    • Medical image security with cheater identification using secret sharing scheme 

      Krishnan, Arun (Dhirubhai Ambani Institute of Information and Communication Technology, 2015)
      The progress in the field of information and communication technology has brought about quick and efficient transfer of textual as well as multimedia data . However, the growth of technology has also provided new ways ...
    • Query interceptor 

      Suthar, Shubham Lalitkumar (2020)
      Query Interceptor is a product comprising three components which aims to maintain healthy database by restricting bad queries from hitting the database and restrict user access to only permitted data. It intercepts queries ...
    • Security and Privacy concerns in Voice Assistants Devices 

      Trivedi, Revant (2021)
      Voice assistant devices are the new generation devices which provides voice interfaces to interact. They are backed with powerful technologies and service providers. These devices perform various tasks by just providing ...