<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>DSpace Community:</title>
    <link>http://10.9.150.37:8080/dspace//handle/atmiyauni/265</link>
    <description />
    <pubDate>Mon, 27 Apr 2026 18:44:30 GMT</pubDate>
    <dc:date>2026-04-27T18:44:30Z</dc:date>
    <item>
      <title>Security and Privacy in Mobile Apps</title>
      <link>http://10.9.150.37:8080/dspace//handle/atmiyauni/2234</link>
      <description>Title: Security and Privacy in Mobile Apps
Authors: Buch, Rachana
Abstract: The world has gone mobile. 80% of adults possess a cell phone and more than half of them have access to internet. The mobile app marketplace is blooming with more than 1.5k mobile apps launched every day in the play store. From movie streaming to cab booking, viewing the Xray to purchasing something online, these apps allow us to do everything from anywhere. Alongside the numerous brilliant capacities these applications offer we should take care that it poses privacy and security challenges, such as the difficulty of giving clients about protection decisions on little screens and the numerous players who may approach sensitive client data</description>
      <pubDate>Mon, 01 Jun 2020 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">http://10.9.150.37:8080/dspace//handle/atmiyauni/2234</guid>
      <dc:date>2020-06-01T00:00:00Z</dc:date>
    </item>
    <item>
      <title>Smart Door Lock-Unlock with Internet of Things &amp; Access Control</title>
      <link>http://10.9.150.37:8080/dspace//handle/atmiyauni/2218</link>
      <description>Title: Smart Door Lock-Unlock with Internet of Things &amp; Access Control
Authors: Bhalodia, Tosal
Abstract: In the current scenario, the internet of things is one of the best and new technology which can easily connect and communicate with control of the device and give a better and easy life with security. With the exponential growth of IoT devices, IoT security is becoming more and more important. Specifically, the first step of security comes from the door. In every field, we need a smart door for safety. In this paper, we are proposing smart door lock and unlock system using keyless method i.e. Bluetooth technology by double verification, fingerprint sensor, and face recognization techniques which cannot be hacked and also non-vulnerable techniques to provide security to various places like home, banks, industries, etc. It will take snaps of the entering person and send it as a floating message to the owner; he/she will have the option to save or ignore the snap. If anyone tries to unlock the door forcefully then an alarm will start and the owner will also receive the message that someone is trying to unlock the door forcefully. So, that owner can inform the neighbor also. At last, we achieve security through access control</description>
      <pubDate>Sat, 01 Jun 2019 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">http://10.9.150.37:8080/dspace//handle/atmiyauni/2218</guid>
      <dc:date>2019-06-01T00:00:00Z</dc:date>
    </item>
    <item>
      <title>Leveraging Block Chain for Ensuring Trust in IoT in Health Care</title>
      <link>http://10.9.150.37:8080/dspace//handle/atmiyauni/2217</link>
      <description>Title: Leveraging Block Chain for Ensuring Trust in IoT in Health Care
Authors: Gandhi, Yesha; Chauhan, Sandip
Abstract: Internet of Things (IoT) devices has completely new challenges regarding security and privacy.&#xD;
Blockchain technology could be a great to mitigate challenges of data security and privacy relay in the IoT.&#xD;
Crypto currency networks like Bit coin, can prove to be required towards understanding concept of&#xD;
decentralized, security and Leveraging of blockchain for privacy preserving. Differential privacy is a&#xD;
mathematical technique of adding a controlled amount of randomized noise to a dataset to prevent anyone&#xD;
from getting information about individuals in the dataset. The added randomized noise is in controlled&#xD;
manner. Therefore, the resultant dataset is still accurate enough to generate aggregate output while&#xD;
maintaining the privacy of individual participants. As Block chain is a peer-to-peer distributed ledger, it is&#xD;
an optimal way for preventing identity, monitoring, non-repudiation and providing tracking i</description>
      <pubDate>Sat, 01 Jan 2022 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">http://10.9.150.37:8080/dspace//handle/atmiyauni/2217</guid>
      <dc:date>2022-01-01T00:00:00Z</dc:date>
    </item>
    <item>
      <title>Darwin,s theory with vishnu,s incarnations</title>
      <link>http://10.9.150.37:8080/dspace//handle/atmiyauni/2210</link>
      <description>Title: Darwin,s theory with vishnu,s incarnations
Authors: Gandhi, Yesha Jayeshbhai
Abstract: The idea of "survival of the fittest," or natural selection, emphasizes the natural world's constant need for adaptation and development. It is a dynamic force that ensures a species' adaptability and relevance in changing settings by shaping its evolutionary course</description>
      <pubDate>Mon, 01 Apr 2024 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">http://10.9.150.37:8080/dspace//handle/atmiyauni/2210</guid>
      <dc:date>2024-04-01T00:00:00Z</dc:date>
    </item>
  </channel>
</rss>

