International Journal of Research in Computer and Communication Technology
[2 followers] Follow
Open Access journal
ISSN (Print) 2320-5156 - ISSN (Online) 2278-5841
Published by Suryansh Publications [2 journals]
- Efficient Anonymity Profile Comparison Techniques To Filter Unwanted
Messages From OSN User Walls
Authors: V.S.N. Murthy, K. Kishore Raju
Abstract: Social networking creates digital communication technologieshone tools for make bigger the social ring of people.It has by nowturned intoasignificant integral part of our dailylives;allow us to contact our friends and families on time. It is hopefulthat the conventional solutions can be more extended to answerthe MSN problems by allowing for the unique social features.Privacy preservation is a momentous research issue in socialnetworking. Since more tailored information is sharedwith the public, disobey the solitude of a target user becomemuch easier. Wefirst advise an explicit Comparison-based Profile Matchingprotocol (eCPM) which runs among two parties, an initiatorand a responder. The eCPM facilitate the initiator to attain thecomparison-based matching outcome about a specified attributein their profiles, while avoid their attribute values fromconfession. Weafter that propose an implicit Comparison-based ProfileMatching protocol (iCPM) which allows the initiator to straightobtain some messages as an alternative of the judgment result fromthe responder.
Issue No: Vol. 4 (2015)
- Procedure Dynamic Network and Prevent Mobile Typically Extension
Authors: Priti Naik
Abstract: Prevent and mobile is taken spread from dynamic networks and mobile networks is used number of times results of mobile users In a mobile network mobile and prevent can use security data lose no. of modifications and remote finding this problem a two-layer network procedure is presented use simulating prevent propagation in Bluetooth and SMS The two models is analyzed for controlling the mobile prevent propagation and change distribution methods taken on the techniques is autonomy-oriented computing (AOC). Then these method is not taken the hybrid prevent that disseminate i.e. both BT and SMS models We introduce an innovative model called a Hybrid prevent detection model. The hybrid mobile can be distributed end-to-end messaging services in personal social communications and short-range wireless communication services it is increasingly the target of propagating prevent through the Bluetooth and Wi-Fi and security in mobile networks In a mobile user and prevent security loss modify depletion of battery power remote models and accessing security short message and call history log An algorithm is design the extension power in a dynamic network with no use to redetect the community in the dynamic network which may significantly improve the security of assessment in a large-scale dynamic network.
Issue No: Vol. 4 (2015)