[vc_row][vc_column][vc_column_text]

Main Reference PaperCost-Effective Authentic and Anonymous Data Sharing with Forward Security, IEEE Transactions on Computers, April 2014.

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column css=”.vc_custom_1456723760841{border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-color: #eeeeee !important;border-left-color: #467db1 !important;border-left-style: solid !important;border-right-color: #467db1 !important;border-right-style: solid !important;border-top-color: #467db1 !important;border-top-style: solid !important;border-bottom-color: #467db1 !important;border-bottom-style: solid !important;}” el_class=”project_short_document_div”][vc_empty_space height=”0px”][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Research Area of the Project” tab_id=”1456231495772-0-1f030-5b4d”][vc_column_text]

[/vc_column_text][/single_tab][/ult_tab_element][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Description” tab_id=”c2f36d6a-352e-6f030-5b4d”][vc_column_text]
  • This paper proposes a new notion called Forward Secure ID-Based Ring Signature. It allows an ID-based ring signature scheme to have forward security. This scheme is useful in many other practical applications, especially to those require user privacy and authentication, such as ad-hoc network, e-commerce activities and smart grid.

[/vc_column_text][/single_tab][/ult_tab_element][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Aim & Objectives” tab_id=”1456230849764-0-4f030-5b4d”][vc_column_text]
  • To provide security in data sharing

  • To provide cost-effective forward security

[/vc_column_text][/single_tab][/ult_tab_element][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Contribution” tab_id=”1456230822819-0-7f030-5b4d”][vc_column_text]
  • Identity-based (ID-based) cryptosystem eliminates the process of verifying and validating the public key certificates. Forward Secure ID-Based signature (IDFSRS) eliminates the costly verification. A private key generator (PKG) computes private keys from its master secret for users and associates an implicit public key to each user within the system. It does not need any pairing operations. The size of user secret key is just one integer.

[/vc_column_text][/single_tab][/ult_tab_element][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Software Tools & Technologies” tab_id=”1456231644788-0-6f030-5b4d”][vc_column_text]
  • Java JDK 1.8, MySQL

  • Netbeans 8.0.1, J2SE, (Cloudsim).

[/vc_column_text][/single_tab][/ult_tab_element][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Project Recommended For” tab_id=”1456231810927-0-6f030-5b4d”][vc_column_text]
  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

[/vc_column_text][/single_tab][/ult_tab_element][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Order To Delivery ” tab_id=”1456477045723-0-9f030-5b4d”][vc_column_text]
  • No Readymade Projects-Depending on the complexity of the project and requirements.

[/vc_column_text][/single_tab][/ult_tab_element][vc_empty_space height=”35px”][vc_row_inner][vc_column_inner width=”1/3″][vc_custom_heading text=”Previous Project” font_container=”tag:h2|font_size:16|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” el_class=”sidebar_head” css=”.vc_custom_1563773954699{border-radius: 10px !important;}” link=”url:https%3A%2F%2Fslogix.in%2Fcaptcha-as-graphical-passwords-a-new-security-primitive-based-on-hard-ai-problems|title:Project%20Titles%20in%20Network%20Security|”][/vc_column_inner][vc_column_inner width=”1/3″][vc_custom_heading text=”Network Security Project List” font_container=”tag:h2|font_size:16|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” el_class=”sidebar_head” css=”.vc_custom_1563774030680{border-radius: 10px !important;}” link=”url:https%3A%2F%2Fslogix.in%2Fproject-titles-in-network-security-and-cryptography|title:Project%20Titles%20in%20Network%20Security|”][/vc_column_inner][vc_column_inner width=”1/3″][vc_custom_heading text=”Next Project” font_container=”tag:h2|font_size:16|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” el_class=”sidebar_head” css=”.vc_custom_1563774074803{border-radius: 10px !important;}” link=”url:https%3A%2F%2Fslogix.in%2Fexpressive-efficient-and-revocable-data-access-control-for-multi-authority-cloud-storage|title:Project%20Titles%20in%20Network%20Security|”][/vc_column_inner][/vc_row_inner][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Go To” tab_id=”1469878537167-0-2″][vc_row_inner][vc_column_inner width=”1/3″][vc_custom_heading text=”WSN Project List” font_container=”tag:h2|font_size:16|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” el_class=”sidebar_head” css=”.vc_custom_1563432400530{border-radius: 10px !important;}” link=”url:https%3A%2F%2Fslogix.in%2Fprojects-in-wireless-sensor-networks|title:WSN%20Project%20List|”][/vc_column_inner][vc_column_inner width=”1/3″][vc_custom_heading text=”MANET Project List” font_container=”tag:h2|font_size:16|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” el_class=”sidebar_head” css=”.vc_custom_1563525661549{border-radius: 10px !important;}” link=”url:https%3A%2F%2Fslogix.in%2Fprojects-in-mobile-ad-hoc-networks|title:MANET%20Project%20List|”][/vc_column_inner][vc_column_inner width=”1/3″][vc_custom_heading text=”Wired Network Project List” font_container=”tag:h2|font_size:16|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” el_class=”sidebar_head” css=”.vc_custom_1563360785730{border-radius: 10px !important;}” link=”url:https%3A%2F%2Fslogix.in%2Fprojects-in-wired-networks|title:Wired%20Network%20Project%20List|”][/vc_column_inner][/vc_row_inner][/single_tab][/ult_tab_element][vc_empty_space height=”35px”][vc_row_inner][vc_column_inner width=”1/3″][ult_buttons btn_title=”Project Inquiry” btn_link=”url:https%3A%2F%2Fslogix.in%2Fproject-enquiry|title:Project%20Enquiry|” btn_size=”ubtn-custom” btn_width=”350″ btn_height=”50″ btn_padding_left=”20″ btn_padding_top=”10″ btn_bg_color=”#eeeeee” btn_bg_color_hover=”#ffffff” icon_size=”32″ btn_icon_pos=”ubtn-sep-icon-at-left” btn_border_style=”solid” btn_color_border=”#467db1″ btn_border_size=”7″ btn_radius=”0″ el_class=”sd_page_button” css_adv_btn=”.vc_custom_1460363650504{padding-top: 5px !important;padding-right: 5px !important;padding-bottom: 5px !important;padding-left: 5px !important;}”][/vc_column_inner][vc_column_inner width=”1/3″][ult_buttons btn_title=”Ph.D Inquiry” btn_link=”url:https%3A%2F%2Fslogix.in%2Fphd-enquiry|title:PhD%20Enquiry|” btn_size=”ubtn-custom” btn_width=”350″ btn_height=”50″ btn_padding_left=”20″ btn_padding_top=”10″ btn_bg_color=”#ffffff” btn_hover=”ubtn-fade-bg” btn_bg_color_hover=”#ffffff” icon_size=”32″ btn_icon_pos=”ubtn-sep-icon-at-left” btn_border_style=”solid” btn_color_border=”#467db1″ btn_border_size=”7″ btn_radius=”0″ el_class=”sd_page_button” css_adv_btn=”.vc_custom_1456728243100{padding-top: 5px !important;padding-right: 5px !important;padding-bottom: 5px !important;padding-left: 5px !important;}”][/vc_column_inner][vc_column_inner width=”1/3″][ult_buttons btn_title=”Ph.D Guidance” btn_link=”url:https%3A%2F%2Fslogix.in%2Fphd-guidance|title:Ph.D%20Guidance|” btn_size=”ubtn-custom” btn_width=”350″ btn_height=”50″ btn_padding_left=”20″ btn_padding_top=”10″ btn_bg_color=”#ffffff” btn_hover=”ubtn-fade-bg” btn_bg_color_hover=”#ffffff” icon_size=”32″ btn_icon_pos=”ubtn-sep-icon-at-left” btn_border_style=”solid” btn_color_border=”#467db1″ btn_border_size=”7″ btn_radius=”0″ el_class=”sd_page_button” css_adv_btn=”.vc_custom_1563275074524{padding-top: 5px !important;padding-right: 5px !important;padding-bottom: 5px !important;padding-left: 5px !important;}”][/vc_column_inner][/vc_row_inner][vc_empty_space height=”20px”][vc_column_text]

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

[/vc_column_text][/vc_column][/vc_row]