Building an intrusion detection system using a filter-based feature selection a…
Read moreRacism Detection Through Sentiment Analysis of Tweets
Read moreFADOHS: Framework for Detection and Integration of Unstructured Data of Hate Sp…
Read moreSecure and Lightweight Fine-Grained Searchable Data Sharing for IoT-Oriented an…
Read moreSanitizable Access Control System for Secure Cloud Storage Against Malicious Da…
Read moreForward Secure Public Key Encryption with Keyword Search for Outsourced Cloud S…
Read moreEnabling Fast Public Auditing and Data Dynamics in Cloud Services
Read moreDual-Server Public-Key Authenticated Encryption with Keyword Search
Read moreDSAS: A Secure Data Sharing and Authorized Searchable Framework for e-Healthcar…
Read moreChecking Only When It Is Necessary: Enabling Integrity Auditing Based on the Ke…
Read moreAuthorized Keyword Search over Outsourced Encrypted Data in Cloud Environment
Read moreAttribute Based Encryption with Privacy Protection and Accountability for Cloud…
Read moreA Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Shari…
Read moreProject Title: A Proxy Re-Encryption Approach to Secure …
Read moreCopyright (c) 2024 JP INFOTECH BLOGGER | JP INFOTECH | All Rights Reseved. JP INFOTECH is no way associated or affiliated with IEEE. Both are separate and independent organisations. IEEE papers can be accessed through the IEEE official websites only. All papers listed in JP INFOTECH are citied with the exact author, publisher details and we don't claim any copyright on it. It's only for Students / Researchers educational purpose only