Secure and Reliable Document Faxing through Wi-Fi using Cloud
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Secure and reliable document faxing through Wi-Fi using cloud is android based application where one can send documents through Wi-Fi within an organization. Organizations mostly use Gmail, Yahoo etc. for sending documents this can hamper the confidentiality. Hence, this application has proposed a new way of sending documents and messages which can be video audio and any file, where organization will have a private cloud which will maintain all user account. Since this is going to be implemented on INTRANET, an individual can only have access to these files within an organization. Faxing can be done in three ways: - Normal mode: where message is sent and received normally with simple encryption decryption. Semi secure mode: where message is sent from sender with a key, that key will be used to open message.(besides encryption decryption). Ultra secure mode: where message will be sent from sender with a key and another key will be sent to his phone by simple SMS so the receiver will need two keys to open the message. Highly confidential data can be sent through this mode
Authors and Affiliations
Sneha Sharma, Gauri Wavhal, Manasveena Suguru, Karishma Tale
Application of Big Data in Intelligent Traffic System
Abstract: With the rapid developmentof society, transportation industryis also facing unprecedentedchallenges, if big data is used in this area, the advantage is obvious, it can resolve the questions of traditional...
An Automated Approach for Job Scheduling and Work Flow Mining
Abstract: Now a day’s work allotment in a software firm become more important and cumbersome. The main objective of this concept is to reduce the work of the software developers in a software company and work alloc...
An Efficient Texture Classification Technique Based on Semi Uniform LBP
Abstract: ‘Local Binary Pattern’ (LBP) operator has been proved to be a theoretically simple yet very effective statistical texture descriptor in many areas. One of the main disadvantage of LBP is they are more sen...
Human Identification via Face Recognition: Comparative Study
Biometric recognition becomes an attractive issue of processing, and have a vast amount of real applications.According to wide spread of Internet and the new aspect of Internet of things, millions of human characteristic...
Prevention and Detection of Wormhole Attack in Mobile Adhoc Network Using Clustering and RTT
Abstract: A security constraint in mobile adhoc network is very critical task. Some critical security issue such as black hole attack, wormhole attack, sinkhole attack, prevention and detection of attack is major challen...