Parveen Bajaj, R. Arora, Mehak Khurana, Shilpa Mahajan
{"title":"Cloud Security: The Future of Data Storage","authors":"Parveen Bajaj, R. Arora, Mehak Khurana, Shilpa Mahajan","doi":"10.1007/978-981-16-3961-6_9","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_9","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131459030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Self-Sovereign Identity Management System Using Blockchain","authors":"Tripti Rathee, Parvinder Singh","doi":"10.1007/978-981-16-3961-6_31","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_31","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130341985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rajeev Tiwari, Roohi Sille, N. Salankar, Pardeep Singh
{"title":"Utilization and Energy Consumption Optimization for Cloud Computing Environment","authors":"Rajeev Tiwari, Roohi Sille, N. Salankar, Pardeep Singh","doi":"10.1007/978-981-16-3961-6_50","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_50","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114676980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hierarchal Communication Architecture for Multi-level Energy Harvesting Support in Underwater Sensor Network","authors":"Anuradha, A. Bindal, D. Prasad, Afshan Hassan","doi":"10.1007/978-981-16-3961-6_48","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_48","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"18 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116167514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abra Shafiq Siddiqi, M. Alam, S. Zafar, Samia Khan, Nida Iftekhar
{"title":"Cognition of Driver Drowsiness to Inculcate Predictive Analysis","authors":"Abra Shafiq Siddiqi, M. Alam, S. Zafar, Samia Khan, Nida Iftekhar","doi":"10.1007/978-981-16-3961-6_37","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_37","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"306 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123055870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authentication of Digital Media Using Reversible Watermarking","authors":"Geeta Sharma, Vinay Kumar, Kavita Chaudhary","doi":"10.1007/978-981-16-3961-6_6","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_6","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125177913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human-Sensing Technologies for Business Solutions","authors":"Rajeev Tiwari, K. Kumar, Satyam Kumar, Shelly","doi":"10.1007/978-981-16-3961-6_42","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_42","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"1999 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128265497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Offensive Approach for Hiding Malicious Payloads in an Image","authors":"Keshav Kaushik, Sneha Surana","doi":"10.1007/978-981-16-3961-6_23","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_23","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128524418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sanya Bindlish, Sargam Chhabra, Kshitij Mehta, P. Sapra
{"title":"Blockchain in Health Care: A Review","authors":"Sanya Bindlish, Sargam Chhabra, Kshitij Mehta, P. Sapra","doi":"10.1007/978-981-16-3961-6_35","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_35","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132556143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Blockchain-Based Secure Car Hiring System","authors":"Sonakshi, S. Verma","doi":"10.1007/978-981-16-3961-6_29","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_29","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132230528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}