Now showing items 1-20 of 20

    • Auditing access to private DATA by android applications 

      Rangnath, Maral Vishal (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      "The capabilities of the mobile device are extended in various useful by Android applications. But with the usefulness and swift advancement of Android, its security issues have also become more and more alarming. The more ...
    • Credit Card Fraud Detection Using MachineLearning Algorithms 

      Tank, Ekta (Dhirubhai Ambani Institute of Information and Communication Technology, 2021)
      Credit Card payment facilitating people to pay for goods and service quickly. The credit payment is gaining popularity day by day because of its benefits. With the popularity of credit card payment, crime related to credit ...
    • Cross-Platform Data Deduplication and Ownership over Encrypted Data 

      Tarkunde, Dipak (2021)
      Data deduplication is the most important data compression technique used in the cloud domain. With this technique, cloud service providers can utilize their storage space efficiently to store large amounts of data. There ...
    • Deduplication On Cloud Storage 

      Gosai, Bhautik (2021)
      Day by day people are moving towards cloud storage for ease of accessibility, availability, security etc. Data Deduplication helps cloud storage to utilize storage space efficiently. Deduplication process is easy when data ...
    • Image authentication using genetic algorithm 

      Londhey, Arjun (Dhirubhai Ambani Institute of Information and Communication Technology, 2016)
      With a widespread deployment of digital images, there is need to authenticatesuch images for their originality and integrity.The main objective of the work is todesign an authentication scheme that allows two parties to ...
    • Medical image security with cheater identification using secret sharing scheme 

      Krishnan, Arun (Dhirubhai Ambani Institute of Information and Communication Technology, 2015)
      The progress in the field of information and communication technology has brought about quick and efficient transfer of textual as well as multimedia data . However, the growth of technology has also provided new ways ...
    • On insider attack in distributed file systems 

      Solani, Riddhi (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
      Due to heavy use of internet, mobiles, sensors etc. Data is growing rapidly day-by-day. However traditional database systems fail to store such a huge semi structured or unstructured data which raises the need for distributed ...
    • On Minimality Attack in Privacy Preserving Data Publishing 

      Hemantha, K. (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      "Data Publishing has become much concern in recent yerars for protecting the individual privacy. Information about the individuals is collected from various domain and is being published public. We can extract lot of wealth ...
    • Privacy preservation in vehicular ad-hoc networks (VANETs) 

      Garg, Garima (Dhirubhai Ambani Institute of Information and Communication Technology, 2015)
      Vehicular Ad-hoc Networks (VANETs) are the special application of Mobile Ad-hoc Networks (MANETs). Due to increase in the number of road accidents, VANETs provide security to road traffic by sending safety messages to other ...
    • Privacy Preserving Identity Verification and Verifiable Computation For HealthCare System 

      Naik, Shruti Rajendrakumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      Paper based medical consulting system has been replaced by electronic health monitoring system due to features like low cost, on demand global accessibility, reliability, accuracy and mobility. Generally, mobile healthcare ...
    • Privacy preserving identity verification with binding blinding technique in cloud assisted healthcare applications 

      Patwa, Dolly R. (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
      In recent times, broad deployment of computers and mobile devices such as mobile phones, PDA's rigged with cost efficient sensors, have shown great potential in recognizing positive direction to healthcare services. It ...
    • Private targeted advertising using homomorphic encryption 

      Dave, Ainish Juotindra (Dhirubhai Ambani Institute of Information and Communication Technology, 2016)
      Privacy of the user data in online setup is an important feature. The users of Internetdo not want to share their private information or interests with anybody.The targeted advertising domain clearly tracks the user activity ...
    • Secure data delivery in mobile ad hoc network using multiple paths 

      Maheshwari, Mayur (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      A mobile ad hoc network (MANET) is a self configurable, self organized, infrastructure less multi hop mobile wireless network.Characteristics of ad hoc network make security a critical issue i.e. any node can join the ...
    • Secure SQL with access control for database as a service model 

      Dave, Jay (Dhirubhai Ambani Institute of Information and Communication Technology, 2014)
      Rapid growth of internet and networking technology emerges "Software as a service model". In this model, application service providers (ASP) provides each functionality of software over internet. ASP provides access of ...
    • Security and Privacy concerns in Voice Assistants Devices 

      Trivedi, Revant (2021)
      Voice assistant devices are the new generation devices which provides voice interfaces to interact. They are backed with powerful technologies and service providers. These devices perform various tasks by just providing ...
    • Security of remote car locking system against eavesdropping 

      Patel, Jinita (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
      Vehicle industry is growing rapidly. To sustain in the market manufacturer uses various technology in vehicles. In today's world users need more comfort in addition to efficiency of vehicles. With the advancement in the ...
    • Tampered Image Detection using SVM Classifier 

      Patel, Dhwani (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      "Steganography is the process of hiding confidential information in image such that contents of original image remain unaltered. Hence steganalysis algorithms used to detect such data embedding needs to be designed. In ...
    • Two phase automated tellar machine transaction for visually impaired 

      Panchal, Krunal (Dhirubhai Ambani Institute of Information and Communication Technology, 2016)
      Voice guided Automated Teller Machine(ATM) are the type of ATM which letsvisually impaired people access the ATM services. Blind users insert wired Headsetsinto audio output jack on the ATM machine and ATM starts Interactive ...
    • Verifiable conjunctive keyword search using authenticated crawlers 

      Sharma, Ritu (Dhirubhai Ambani Institute of Information and Communication Technology, 2016)
      Authenticity of search results corresponding to the user�s query is an importantrequirement in public cloud as massive data are being generated from differentsources frequently. There is a constant rise in the trust issues ...
    • Wireless LAN 802.11 security using elliptic curve cryptography 

      Singh, Saurabh (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      IEEE 802.11 is a standard defines the specification of Wireless Local Area Network (WLAN), came into existence in 1997. As communication medium is wireless, security is a major concern to protect the data from adversary. ...