NOVEL TECHNIQUES TO SAFEGUARD PRIVACY AND SECURITY ON MOBILE DEVICES THROUGH OPTIMAL ALGORITHMS
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 4, Issue 6
Abstract
The rapid proliferation of smart phone technology in urban communities has enabled mobile users to utilize context aware - services on their devices. Today’s highly interconnected urban population is increasingly dependent on these gadgets to organize and plan their daily lives. They often rely on the preferred locations according to their deman ds thus lacking security. In this paper we propose algorithms which provide privacy and security to user contents and requirements. Users may not want to reveal their actual locations to a third party which are not trustworthy. We perform a thorough privac y estimation and optimization for determining an optimal meeting location for a group of users. Our solutions are based on the homomorphic properties of well - known cryptosystems.
Authors and Affiliations
Ruhi Dubey , Garima Singh
SUPPLIER SELECTION PROCESS IN SUPPLY CHAIN MANAGEMENT
Supplier’s Selection is one among the foremost essential activities of supply chain management. Supplier’s Selection could be an advanced activity involving qualitative and quantitative multi-criteria. A trade-off...
CHARACTERIZATION OF PEO CONDUCTING POLYMER ELECTROLYTE COMPLEXED WITH KNO3 ALKALI SALT AND NB2O5 NANO-FILLER
Conducting solid phase polymer electrolyte (SPE) films were synthesized using solution casting technique. In the present study the polyethylene oxide [PEO] complexed with potassium nitrate [KNO3] as alkali salt gr...
EEG Signals Generation and Its Reconstruction
— Biomedical signal compression is of increasing interest due to the need of storing or transmitting large amount of multichannel data. Wavelets and wavelet packets have recently emerged as powerful tools for s...
HAMILTONIAN LACEABILITY IN MIDDLE GRAPHS
This paper is aimed to discuss Hamiltonian laceability in the context of the Middle graph of a graph. We explore laceability properties of the Middle graph of the Gear graph, Fan graph, Wheel graph, Path and Cycle...
Vulnerable Security Aspects of Windows
With the advancement in technology we are having everything available on a single click. Instead of wasting a lot of time while standing in a queue for a task to be done now we just have to open our device and co...