Search

Your search keyword '"Data_MISCELLANEOUS"' showing total 190 results

Search Constraints

Start Over You searched for: Descriptor "Data_MISCELLANEOUS" Remove constraint Descriptor: "Data_MISCELLANEOUS" Journal international journal of computer applications Remove constraint Journal: international journal of computer applications
190 results on '"Data_MISCELLANEOUS"'

Search Results

1. Replication Effect over Hadoop MapReduce Performance using Regression Analysis

2. Key Factor Authentication and Access Control for Accessing Cloud Computing Services

3. Privacy Preserved Data Publishing Techniques for Tabular Data

4. Replica Node Detection in Static Wireless Sensor Networks using Neighborhood Information

5. Design and Analysis of Hybrid Model Using DELPHI Encoding for Visible and Invisible Image Watermarking

6. Recognition using Multimodal Biometric

7. Catalogue of Hybrid Video Watermarking Techniques

8. Biometrics : Analysis of Fingerprint using Hybrid Transformations

9. Identification of K- Tuples using K-Anonymity Algorithm to the Watermarking of Social Network Database

10. A Study Latent Search and Feature Extraction Techniques used in Fingerprint Recognition

11. Review on Public Auditing for Cloud Storage using Third Party Auditors

12. Installation of OpenStack (Liberty release) using PackStack

13. Analysis of EnDeCloudReports for Encrypting and Decrypting Data in Cloud

14. Review on k -Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data

15. Review Paper on Wormhole Attack

16. Trusted Cloud Computing Platform into Infrastructure as a Service Layer to Improve Confidentiality and Integrity of VMs

17. A New Cryptosystem based on Fingerprint Features

18. Extracting Potential Forensic Evidences from Cloud Client Device using own Cloud as a Case Study

19. Fingerprint Indexing Approaches for Biometric Database: A Review

20. A Spatial Domain Reversible Visible Watermarking Technique for Textured Images

21. Techniques of Digital Image Watermarking: A Review

22. Enhancing Security in Public Clouds using Data Anonymization Techniques

23. A Print-Scan Resilient Watermarking based on Fourier Transform and Image Restoration

24. Sybil Node Detection and Prevention Approach on Physical Location in VANET

25. Analysis of Symmetric Searchable Encryption and Data Retrieval in Cloud Computing

26. Digital Audio Watermarking using Frequency Masking Technique

27. Two Fragile Encryption-Watermarking Combined Schemes for Image Authentication with Tamper Detection and Localization

28. Cloud Service ranking and Selection using Linear Programming

29. Restrict Piracy of Videos using DWT-SVD based Video Watermarking

30. DD-PLAC: Preserving Privacy with Encrypted Cloud Database

31. Spoof Detection of Fingerprint Biometrics based on Local and Global Quality Measures

32. Evolution of Various Authentication Schemes in Wireless Network over a Decade

33. Digital Image Watermarking using 3-Level DWT and FFT via Image Compression

34. Video Authentication and Copyright Protection using Unique Watermark Generation Technique and Singular Value Decomposition

35. Interaction Modelling using Trust and Recommendation in Cloud Computing Environment

36. Securing Images in Cloud using Hyper Chaos with User Authentication

37. Design of a Novel Trust Model and its Application in Trust based Routing to Defend against Dishonest Recommenders

38. Data Hiding using Advanced LSB with RSA Algorithm

39. Copyright Protection of Data by using Video Watermarkings

40. Energy Efficient Dynamic Load Balancing Algorithm for Cloud Environment

41. Fingerprint Recognition based on Minutiae Information

42. A Survey of Intrusion Detection System for Denial of Service Attack in Cloud

43. Secret Sharing based Secure Authentication System

44. Analysis of Robustness of Hybrid Video Watermarking Against Multiple Attacks

45. A Conceptual Technique for Deriving Encryption Keys from Fingerprints to Secure Fingerprint Templates in Unimodal Biometric Systems

46. Cloud Computing Security Improvement using Diffie Hellman and AES

47. A Review on Security of Multimodal Biometrics

48. Patient Controlled Encryption using Key Aggregation

49. Digital Watermarking Algorithm for Embedding Color Image using Two Level DWT

50. Hybrid Security System based on Wavelet Domain Watermarking and Chaotic Map Cryptography

Catalog

Books, media, physical & digital resources