Now showing items 1-15 of 15

    • Academic document verification using SSI and blockchain technology 

      Huda, Md. Isa Sayek (Brac University, 2023-09)
      Academic certificates are evidence of qualification for their recipients. Although academic data is regularly transmitted by institutes, the procedure of transferring and verifying this data is usually tiring and ...
    • Blockchain based Secured Multipurpose Identity (SMID) management system for smart cities 

      Rahat, Abrarul Hassan; Joti, Tassnim Jaman; Akter, Tania; Tasnin, Humayra; Rumon, Mamunur Rashid (Brac University, 2021-09)
      Blockchain, the decentralized architecture and distributed public ledger technology that enables Bitcoin, has recently drawn a strong interest from governments, nancial institutions, and high-tech companies. In modern ...
    • Covert data transmission using secret-sharing and network steganography 

      Islam, Mohammad Ariful; Simran, Shahrin Shafiq; Aseef, Mahir; Rahman, Labiba (Brac University, 2024-01)
      The present has made us more dependent on technology than ever before. As technology develops and new fields emerge, it has become more complicated to maintain a safe, secure, and covert environment for transmitting ...
    • Cross banking transaction system using multichain blockchain systems 

      Sharar, Shihab; Morshed, Ishfaq; Sadia, Kazi Sumaia (Brac University, 2024-01)
      Money is the most common form of exchange for goods and services across the world. Ensuring that this money is kept safe and transferred to the right person has been essential ever since the concept of money has been ...
    • Demands of Cybersecurity in Bangladeshi Financial Sector 

      Zohra, Fatema Tuz (Brac University, 2022-06)
      This report is the comprehensive highlight of my whole internship experience at Enterprise Infosec Consultants. It is aimed to portray to the whole company and my research project, which is based on ‘The demand of ...
    • Enhanced and secured hybrid steganography model for hiding large data 

      Majumder, Srabony; Tanu, Mohon Dash; Faisal, S. M. Fahim; Sristy, Mumtahinah Rahman; Paul, Rigan (Brac University, 2023-05)
      Recent works on steganography basically are focused on various network layers and multiple data-hiding techniques. These researches lead to image manipula- tion, contortion and small-scale payload. This paper proposes a ...
    • Ensure security in supply chain with blockchain technology 

      Tarannum, Fairuz; Nafiz, Nazibun; Khanam, Sumaya; Tabassum, Wasy; Kamor, Rudaba Adnin (Brac University, 2022-09-29)
      Supply chain essentially means the network between the suppliers and distributors to produce and distribute products to the final consumers which comprises various activities, entities, databases and responsibilities. ...
    • Ensuring CIA triad using EJBCA solution digital certificate trust model 

      Ferdous, Jannatul (Brac University, 2022-05)
      At present ensuring confidentiality, integrity and availability of information is a big challenge. Cyber-attacks such as man in the middle attack, eavesdropping, spoofing is commonly known inside threats. Leakage of ...
    • An investigation on implementations of theoretical whitebox cryptographic solutions 

      Eshan, Adnan Rahman; Kashfee, Jarin Tasnim Khan; Hasan, Md. Rabib; Islam, Mahmudul (Brac University, 2024-01)
      Whitebox Cryptography techniques are those which are aimed at protecting software implementations of cryptographic algorithms against key recovery in unprotected devices. The sensitive data embedded in the code is the ...
    • A machine learning based approach for DDos attack detection 

      Tahrim, Tasmiah; Sharan, MD Asif; Monsur, Meshaq; Hasan, MD Abid; Azad, Tanzina Binte (Brac University, 2023-09)
      The modern era saw the rise of technologies in almost every sector. Computers are gradually becoming faster and smaller, also allowing people to utilize them almost everywhere. As computer technology has become an important ...
    • Mitigating DDoS attacks using a resource sharing network 

      Khan, Farabi Fardin; Hossain, Nafis Mohaimin; Mahmud, Toushif; Anwar, Sad Bin; Islam, Sirajul (Brac University, 2021-10)
      Cloud computing is crucial to the internet just as air is crucial to breathing. Most users do not even come to think how the cloud architecture is one of the giant pillars on which the entire internet and all its related ...
    • A performance comparison between machine learning models on zero-day attack detection 

      Awon, Ahmed Musa; Odree, Afid; Islam, Samia; Yeasmin, Afia; Biva, Bivasha Bashir (Brac University, 2021-01)
      Traditional IDS has been shielding against cyber threats for many years but it falls short on detecting zero-day attacks. These are the attacks that are unique with unknown attack patterns and mutating attack signatures ...
    • Privacy-preserving healthcare data management system using blockchain technology 

      Arshad, Abir; Das, Devamitra; Rahman, Md.Mostafizur; Mostafi, Md.Tarik-Ul-; Biswas, Swapnil (Brac University, 2022-05)
      In recent years, blockchain technology has gotten plenty of attention, with rising interest in an exceedingly type of way resembling as-Banking, Telecommunication, IoT, aid etc. Each different sector, Blockchain has ...
    • ROBB: recurrent proximal policy optimization reinforcement learning for optimal block formation in bitcoin blockchain network 

      Dutta, Amit (Brac University, 2023-07)
      Blockchain is a ground-breaking technology that has changed how we manage and store protected data. It is a decentralized ledger that enables safe, open, and unchangeable record-keeping. It relies on a distributed network ...
    • ShielDroid: a hybrid ML and DL approach for real-time malware detection system in Android 

      Ahmed, Md Faisal; Biash, Zarin Tasnim; Shakil, Abu Raihan; Ryen, Ahmed Ann Noor; Hossain, Arman (Brac University, 2021-09)
      Due to the rapid development of the advanced world of technology, there is a high increase in devices such as smartphones and tablets, which increase the number of applications used. Though an application has to pass the ...