New Method for Making Digital Artifacts on Security Essentials of Web Verifiable and Reliable IJTSRD
To make digital artifacts, for example, code, datasets, messages, and pictures obvious and changeless. Moreover, there is no regularly acknowledged strategy to authorize this changelessness of computerized curios. To take care of this issue, we propose trusty URIs containing base 64 encryption values. Base 64 encoding can be utilized while recognizing a substance which is […]
Advanced Security System using PIC through Bluetooth IJTSRD
The objective of our project is to develop an Exploiting Bluetooth on Android mobile devices for home appliances control appliances control application. Mobile deviceshave been integrated into our everyday life consequently, home automation is becoming increasingly prominent features on mobile devices .We have developed a security system that interfaces with an android mobile devices.The mobile […]
Privacy in Advertisement Services using Big Data: A Survey IJTSRD
The privacy is primary requirement of growing technology. Maintaining Isolation over sensitive data in public environment is a big challenging task. It becomes more complex when data set becomes very large and number of users reaches to huge figure. Access Control principle help to classify the users according to rights and permission. Integration of Access […]
Internet of Things(IoT) in HealthCare IJTSRD
IoT is a modest way to elevate our production and yield with the help of internet. We can supervise and control and communicate with the help of internet. Internet Of Things imagines a future physical and digital entities are to be linked by proper information and communication technologies which will sanction new class of applications […]
A Survey Paper on Identity Theft in the Internet IJTSRD
Identity of any internet user is stole in seconds and the user may not aware about it. There are various tools available in the internet which allow anyone to steal data of any particular user, if he she is connected to internet. The attacker is not required to have advanced knowledge about the internet technology […]