236 results on '"RAO, UDAI PRATAP"'
Search Results
2. Mh-abe: multi-authority and hierarchical attribute based encryption scheme for secure electronic health record sharing
3. DL-HIDS: deep learning-based host intrusion detection system using system calls-to-image for containerized cloud environment
4. A novel hybrid framework for Cloud Intrusion Detection System using system call sequence analysis
5. PGASH: Provable group-based authentication scheme for Internet of Healthcare Things
6. Twitter Sentiment Analysis Using Different Machine Learning Techniques
7. Deep Learning-Based Solution for Intrusion Detection in the Internet of Things
8. A Motive Towards Enforcement of Attribute-Based Access Control Models in Dynamic Environments
9. Exploring security and trust mechanisms in online social networks: An extensive review
10. Attribute based access control (ABAC) scheme with a fully flexible delegation mechanism for IoT healthcare
11. Secrecy aware key management scheme for Internet of Healthcare Things
12. A Review of Machine Learning-Based Intrusion Detection Systems on the Cloud
13. Decentralized Blockchain-Based Framework for Securing Review System
14. White-Box Encryption Scheme for Resource-Constrained IoT Devices
15. Impact Analysis of Rank Attack on RPL-Based 6LoWPAN Networks in Internet of Things and Aftermaths
16. A novel trust prediction approach for online social networks based on multifaceted feature similarity
17. Performance Evaluation of RPL Protocol Under Decreased and Increased Rank Attacks: A Focus on Smart Home Use-Case
18. A novel defense mechanism to protect users from profile cloning attack on Online Social Networks (OSNs)
19. A Motive Towards Enforcement of Attribute-Based Access Control Models in Dynamic Environments
20. Investigating and Devising Privacy Preserving Approaches for Location-Based Services
21. An Interaction-Based and Graph-Based Hybrid Approach to Evaluate Trust in Online Social Networks (OSNs)
22. ElGamal Homomorphic Encryption-Based Privacy Preserving Association Rule Mining on Horizontally Partitioned Healthcare Data
23. An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions
24. Design and evaluation of a novel White-box encryption scheme for resource-constrained IoT devices
25. User behavior-based and graph-based hybrid approach for detection of Sybil Attack in online social networks
26. Context-Aware Computing for IoT: History, Applications and Research Challenges
27. Document Management System Empowered by Effective Amalgam of Blockchain and IPFS
28. EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things
29. A novel decentralized security architecture against sybil attack in RPL-based IoT networks: a focus on smart home use case
30. Decentralised Ecosystem for Journalism based on Blockchain
31. Preserving Location Privacy Using Blockchain
32. White-Box Encryption Scheme for Resource-Constrained IoT Devices
33. A Review of Machine Learning-Based Intrusion Detection Systems on the Cloud
34. Investigating and Devising Privacy Preserving Approaches for Location-Based Services
35. Decentralized Blockchain-Based Framework for Securing Review System
36. Blockchain for Information Security and Privacy
37. A New Ecosystem for Digital Identity Verification Using Blockchain
38. SCC-LBS: Secure Criss-Cross Location-Based Service in Logistics
39. Towards Privacy-Preserving Dummy Generation in Location-Based Services
40. Improving healthcare services using source anonymous scheme with privacy preserving distributed healthcare data collection and mining
41. A Novel approach as Multi-place Watermarking for Security in Database
42. Preserving location privacy using three layer RDV masking in geocoded published discrete point data
43. Toward Scalable Anonymization for Privacy-Preserving Big Data Publishing
44. Privacy Protection Through Hiding Location Coordinates Using Geometric Transformation Techniques in Location-Based Services Enabled Mobiles
45. Privacy Preserving Association Rule Mining on Distributed Healthcare Data: COVID-19 and Breast Cancer Case Study
46. Scalable l-Diversity
47. A novel hybrid framework for Cloud Intrusion Detection System using system call sequence analysis
48. Decentralised Ecosystem for Journalism based on Blockchain
49. Preserving Location Privacy Using Blockchain
50. VIC-PRO: Vicinity Protection by Concealing Location Coordinates Using Geometrical Transformations in Location Based Services
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.