-
1
Storify : Protecting privacy of social media post with hash-based anonymity
Published 2022“…Lack of anonymous features of recent social media apps that allow users to express their feelings without getting hurt by cyber bullying has urged recently to protect user’s privacy. This project proposes a social media application, called as “Storify”, that aimed to protect privacy of social media post with hash-based Anonymity. …”
Get full text
Get full text
Academic Exercise -
2
Doctor-patient remote consultation system with secure medical images
Published 2022“…Hence, security of our privacy information had becoming a tricky trouble to deal with. …”
Get full text
Get full text
Academic Exercise -
3
Ridesharing utilization in Universiti Malaysia Sabah, influencing factors and impact towards sustainable transportation
Published 2022“…Respondents were most worried about a loss of privacy or independence during the ridesharing, a limitation of proper facilities, a lack of personal data security, and an unclear cost structure and timetable. …”
Get full text
Get full text
Academic Exercise -
4
Securing campus access control and management system with attribute-based access control (ABAC)
Published 2022“…Campus Access Control and Management System of UMS Campus still relies on conventional manual registration and spreadsheet management, resulted in a time-consumed registration process, inconsistent data entries, and disclosure of visitor’s privacy. The registration and access control becoming worst during the covid-19 pandemic. …”
Get full text
Get full text
Academic Exercise -
5
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. The objective of this project includes, (i) To investigate the lightweight geo-encryption in terms of their computation speed, generated ciphertext, and key size by using literature review and experimental approach. …”
Get full text
Get full text
Academic Exercise