All Stories

  1. Secure Supervised Learning-Based Smart Home Authentication Framework
  2. SDS-IAM: Secure Data Storage with Identity and Access Management in Blockchain
  3. A Review of Modern Authentication Methods in Digital Systems
  4. Merkle hash tree improved strongly constrained discrete hashing function-based authentication scheme for enabling security for smart home IoT applications
  5. DaDe: A Study of Chunking Algorithm and Hashing Function in Block Level Chunk based Data Deduplication
  6. Analysis of Cross-Site Scripting Vulnerabilities in Various Day-To-Day Web Applications
  7. Scalable blockchain model using off-chain IPFS storage for healthcare data security and privacy
  8. Similarity Learning-Based Supervised Discrete Hash Signature Scheme for Authentication of Smart Home Scenario
  9. A Survey on Hadoop Security and Comparative Analysis on Authentication Frameworks in Hadoop Clusters
  10. Similarity Learning-Based Supervised Discrete Hash Signature Scheme for authentication of smart home scenario
  11. Secure data transmission for protecting the users' privacy in medical internet of things
  12. Dynamic Forest of Random Subsets‐based supervised hash signature scheme for secure user authentication in smart home environment
  13. Blockchain Based Authentication Framework for Kerberos Enabled Hadoop Clusters
  14. Security in IoT Devices
  15. M2U2: Multifactor Mobile Based Unique User Authentication Mechanism
  16. TSCBA-A Mitigation System for ARP Cache Poisoning Attacks
  17. Security Solution for ARP Cache Poisoning Attacks in Large Data Centre Networks
  18. Security Breaches and Threat Prevention in the Internet of Things
  19. Secret Image Enhanced Sharing Using Visual Cryptography
  20. AutiTRACK: monitoring autism patients with IoT
  21. CAESAR CLOUD: A Comprehensive Approach for Enhancing Cloud Security and Service Availability based on Reputation
  22. Securing cloud data using visual cryptography
  23. Security for the Big database stored in cloud
  24. Cloud based VoIP Application in Aircraft Data Networks
  25. Reputation Based Service for Cloud User Environment
  26. SCT: Secured Cloud based Telemedicine
  27. Distributed Denial of service attacks and its effects on Cloud environment- a survey
  28. ASCIi based cryptography using unique id, matrix multiplication and palindrome number
  29. Rqa based approach to detect and prevent ddos attacks in voip networks
  30. A Virtual Firewall Mechanism Using Army Nodes to Protect Cloud Infrastructure from DDoS Attacks
  31. Escape-on-Sight: An Efficient and Scalable Mechanism for Escaping DDoS Attacks in Cloud Computing Environment
  32. Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP
  33. A Study on Security Threats in Cloud
  34. Secured Multi-Cloud Virtual Infrastructure with Improved Performance
  35. A Recurrence Quantification Analytical Approach to Detect DDoS Attacks
  36. Security in IoT Devices