A Novel Approach Based on Quantum Key Distribution Using BB84 and E91 Protocol for Resilient Encryption and Eavesdropper Detection

5,500.00

Aim:

Ā  Ā  Ā  Ā  To implement a secure, interactive, and educational Quantum Key Distribution (QKD) system using the SARG04 algorithm simulated with Qiskit and deployed as a full-stack web application (Flask + React + MySQL) for demonstrating real-time quantum key sharing and eavesdropper detection between Alice, Bob, and Eve.

Blockchain-Based Secure and Efficient Secret Image Sharing with Outsourcing Computation in Wireless Networks

5,500.00
Our study aims to develop a Blockchain-Enabled Secret Image Sharing (BC-SESIS) system that ensures secure, transparent, and tamper-proof storage and retrieval of sensitive image data, enhancing trust, privacy, and data integrity in wireless communication networks.

GreenLand: A Secure Land Registration Scheme for Blockchain and AI-Enabled Agriculture Industry 5.0

5,500.00
Our study aims to introduce a Blockchain-Enabled Land Registration System powered by AI to ensure secure, transparent, and tamper-proof land ownership records in agriculture, enhancing trust and reducing fraud in the agricultural sector.

Integrated Digital Twins System for Oil Temperature Prediction of Power Transformer Based on Internet of Things

Call for Price

Aim:

Ā  Ā  Ā  Ā  Ā The Mainstay of the project is to develop an IoT-based real-time monitoring system for power transformers using an ESP32, enabling continuous tracking of temperature, oil level, voltage, and current while visualizing faults through a 3D model for proactive maintenance and improved reliability.

RoundImage Towards Secure Graphical Password Authentication via Rounded Image Selection in IoT

5,500.00

Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā  Our study aims to develop a Multi-Factor Authentication System that integrates RoundImage-based graphical password verification with Time-based One-Time Password (T-OTP) authentication to ensure secure, reliable, and observation-resistant user login. The system is designed to enhance trust, prevent unauthorized access, and reduce credential-based attacks by providing a tamper-resistant, user-friendly, and highly secure authentication framework suitable for modern digital environments, including IoT and web applications.