+(91) 99007-25045
support@evolettechnologies.com

Network Security

SNO

NETWORK SECURITY 2017-2018

Download

PDF/DOC

   ETNS01 Efficient and Confidentiality-Preserving Content-Based PublishSubscribe with Prefiltering  

PDF/DOC

ETNS02 Efficient and Privacy-Preserving Min and k th Min Computations in Mobile Sensing Systems PDF/DOC
ETNS03 Efficient Privacy-Preserving Facial Expression Classification PDF/DOC
ETNS04 Generic Soft-Error Detection and Correction for Concurrent Data Structures PDF/DOC
ETNS05 Hardness of Firewall Analysis PDF/DOC
ETNS06 High Performance and High Scalable Packet Classification Algorithm for Network Security Systems PDF/DOC
ETNS07 Large-Scale Automated Software Diversity—Program Evolution Redux PDF/DOC
ETNS08 Local Recovery for High Availability in Strongly Consistent Cloud Services PDF/DOC
ETNS09 My Privacy My Decision Control of Photo Sharing on Online Social Networks PDF/DOC
ETNS10 On Emerging Family of Elliptic Curves to Secure Internet of Things ECC Comes of Age PDF/DOC
ETNS11 Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices PDF/DOC
ETNS12 Robustness-Driven Resilience Evaluation of Self-Adaptive Software Systems PDF/DOC
ETNS13 Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids PDF/DOC
ETNS14 SMA A System-Level Mutual Authentication for Protecting Electronic Hardware and Firmware PDF/DOC
ETNS15 Towards a Reliable Detection of Covert Timing Channels over Real-Time Network Traffic PDF/DOC
ETNS16 Trapdoor computational fuzzy extractors and stateless cryptographically-secure physical unclonable functions PDF/DOC
ETNS17 Universally Composable RFID Mutual Authentication PDF/DOC
ETNS18 Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing PDF/DOC
ETNS19 A Novel Class of Robust Covert Channels Using Out-of-Order Packets PDF/DOC
ETNS20 A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage PDF/DOC
ETNS21 A Traceback Attack on Freenet PDF/DOC
ETNS22 An Efficient Lattice Based Multi-Stage Secret Sharing Scheme PDF/DOC
ETNS23 Delay-Based Location Verification for the Internet PDF/DOC
ETNS24 Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping PDF/DOC
ETNS25 Don’t fool Me! Detection, Characterisation and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks PDF/DOC