A Novel Approach Based on Quantum Key Distribution Using BB84 and E91 Protocol for Resilient Encryption and Eavesdropper Detection

5,500.00

Aim:

Ā  Ā  Ā  Ā  To implement a secure, interactive, and educational Quantum Key Distribution (QKD) system using the SARG04 algorithm simulated with Qiskit and deployed as a full-stack web application (Flask + React + MySQL) for demonstrating real-time quantum key sharing and eavesdropper detection between Alice, Bob, and Eve.

Agri-4-All: A Framework for Blockchain Based Agricultural Food Supply Chains in the Era of Fourth Industrial Revolution

5,500.00
Aim: Ā Ā Ā Ā Ā Ā Ā Ā Ā  Our study aims to develop a blockchain-based web application that enhances transparency and traceability in the agricultural food

Blockchain-based Anti-Counterfeit Product Identification System

5,500.00
Aim: Ā Ā Ā Ā Ā Ā  Our study aims at Blockchain-based Anti-Counterfeit Product Identification System using QR Code for tracking and verifying authenticity of

BSFR-SH: Blockchain-Enabled Security Framework against Ransomware Attacks for Smart Healthcare

5,500.00
Aim: Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā  Our study aims to introduce a Blockchain-Enabled Security Framework against Ransomware Attacks using Machine Learning to ensure high

RoundImage Towards Secure Graphical Password Authentication via Rounded Image Selection in IoT

5,500.00

Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā  Our study aims to develop a Multi-Factor Authentication System that integrates RoundImage-based graphical password verification with Time-based One-Time Password (T-OTP) authentication to ensure secure, reliable, and observation-resistant user login. The system is designed to enhance trust, prevent unauthorized access, and reduce credential-based attacks by providing a tamper-resistant, user-friendly, and highly secure authentication framework suitable for modern digital environments, including IoT and web applications.

Understanding the Security Risks of Websites Using Cloud Storage for Direct User File Uploads

5,500.00
Aim: Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā To systematically analyze and identify security vulnerabilities in websites that allow users to upload files directly to cloud storage services, assess their real-world prevalence, and propose effective mitigation strategies to protect users, websites, and cloud infrastructure from potential abuse, data breaches, and operational disruptions.