Notice Board :

Call for Paper
Vol. 10 Issue 8

Submission Start Date:
Aug 01, 2018

Acceptence Notification Start:
Aug 10, 2018

Submission End:
Aug 15, 2018

Final MenuScript Due:
Aug 25, 2018

Publication Date:
Aug 30, 2018
                         Notice Board: Call for PaperVol. 10 Issue 8      Submission Start Date: Aug 01, 2018      Acceptence Notification Start: Aug 10, 2018      Submission End: Aug 15, 2018      Final MenuScript Due: Aug 25, 2018      Publication Date: Aug 30, 2018




Volume VII Issue VIII

Author Name
C S Dlamini, T Lombardi
Year Of Publication
2015
Volume and Issue
Volume 7 Issue 8
Abstract
Many Attribute-Based secret writing (ABE) schemes do not defend receivers’ privacy, such all the attributes to describe the eligible receivers square measure transmitted in plaintexts. Hidden policy-based ABE schemes are planned to safeguard receivers’ privacy by employing a construction that needs each user within the system to rewrite the cipher text victimization all the attributes they possess, which incurs nice computation and communication overhead. To handle this issue, during this paper, we propose a brand new idea – Gradual Identity Exposure (GIE) – to protect information receivers’ identity. Our approach is to disclose the receivers’ info bit by bit by permitting cipher text recipients for decrypting the message victimization their possessed attributes one-by- one (but not all). If the receiver doesn't possess one attribute in this procedure, the remainder of attributes square measure still unknown.
PaperID
2015/EUSRM/8/2015/26640

Author Name
P Leszkowicz, Bruno E, Adela L
Year Of Publication
2015
Volume and Issue
Volume 7 Issue 8
Abstract
Information security could be a necessary safeguard for mobile e-commerce and a secure communication system to get high quality secure communication in wireless surroundings is introduced, that is integration 3 varieties of secret writing algorithms together with AES, RSA and CPRS chaos secret writing. Secure communication framework supported three-layer encryption model is proposed: (1) AES layer of system code decrypt, system boot and also the system self-destruct; (2) RSA layer of authentication, key negotiation and key management functions; (3) CPRS layer of communication information stream encryption and decipherment. The implementation and improvement of the above-named 3 varieties of algorithms are mentioned. The experiments show the 3 varieties of secret writing algorithms are safe and reliable to attain a high degree of secure communication.
PaperID
2015/EUSRM/8/2015/26714

Author Name
Armour J D, P S Moreno
Year Of Publication
2015
Volume and Issue
Volume 7 Issue 8
Abstract
In this paper, a secure communication system supported fractional Fourier rework (FrFT) is expected. Data is encrypted by an explicit order FrFT at transmitter, and then divided into 2 elements and sent away. The receiver decodes the signal victimization FrFT with the corresponding order to the transmitter to get the initial knowledge. Simulation results demonstrate the effectiveness of the projected secure communication system, and therefore the bit error rate for the signals without decoding remains massive even for prime signal/noise ratio.
PaperID
2015/EUSRM/8/2015/26779

Author Name
T Mahale, Mr. J. Dangra, Dr. M. K. Rawat
Year Of Publication
2015
Volume and Issue
Volume 7 Issue 8
Abstract
Storing data in the cloud storage is based on various algorithms. There are various technologies that have been implemented for increasing the performance of accessing stored data in the cloud but they are not efficient and Various malicious activities from illegal users have threatened cloud technology such as data misuse, inflexible access control and limited monitoring. The occurrence of these threats may result into damaging or illegal access of critical and confidential data of users. Although there are various authentication schemes have been implemented for the security of these data but either they are too much complex or they require huge network resources. In this paper we introduce a new methodology Pre-calculated for storing data and also provide security in terms to authentication for stored data in clouds by using Cipher patterns.
PaperID
2015/EUSRM/8/2015/26854