Stategy And Necessity Trades For Smile Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 9
Abstract
The mobile social networks are likely to a large extent enhance interaction with mobile users and shared the information in encounter-based social network. In this encounter traditional social network as opposed users abuse the information’s. So this new approach challenges network basically different by previous social network designs this new approach presents challenges that are fundamentally different from those tackled by previous social network designs. In this paper, we explore the functional and security requirements for these new systems, such as availability, security, and privacy, and present several design options for building secure encounter-based social networks. Here also we explore different requirements for these new systems. We first provide an introduction to the surveillance, social and institutional privacy perspectives. We then explore the differences between these approaches in order to understand their complementarity. In this paper, we explore the privacy requirements for Encounter- based social networks. We provide an overview on the privacy guarantees and feasibility of SMILE and also its drawback in meeting certain requirements. So we describes the design of SMILE, is secure for a privacy-protection “missed-connections” service for mobile users. It also provides services using mobile devices without relying on trusted coordinating server. Here SMILE design using key exchange protocols. We develop cryptography hash technique for protect the information through the mobile application. This paper presents a design of secure encounter-based social network by implementing in android application called MeetUp.
Authors and Affiliations
Dendukuri rama Manohar, Barigala Srikanth, Saritha Seelam
Recognition besides Adjustment of Inaccurate Fingerprints Matching
Biometric distinguishing proof has included noticeably for people with unique mark developing as the prevailing one. The strength of unique mark is been set up by the persistent rise of diverse types of Automated Fin...
Low Power Adiabatic Complementary Pass Transistor Logic for Sequential Circuit
The VLSI circuit design with extremely low energy dissipation is our approach which uses Adiabatic concept. Adiabatic logic is an attractive low power approach by restricting the currents to flow across devices with...
Design Of Ternary Logic Gates Using CNTFET
This paper presents a novel design of ternary logic gates like STI,PTI,NTI,NAND and NOR using carbon nanotube field effect transistors. Ternary logic is a promising alternative to the conventional binary logic design...
A Survey on Password Attack Resist Tools
Passwords are the key to all digital secrets. Passwords remain the most widely used authentication method despite their well-known security weaknesses. Text password is the most popular form of user authentication on...
Achieving Data Security Using Inter Clouds
Cloud computing provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive inf...