Ain Shams University

Displaying 1-7 of 7 results

  • White Papers // May 2013

    A Database Watermarking Service with a Trusted Authority Architecture for Cloud Environment

    Providing cloud services gets an increasing interest of both scientific and industrial applications today. Storage services are the fundamental component of the Cloud computing paradigm. Exploiting such storage services enables users to outsource their data into the cloud. Not only is the reduction of storage and maintenance costs achieved but...

    Provided By Ain Shams University

  • White Papers // Nov 2010

    Improving the Lifetime of Wireless Ad Hoc Networks Using Power Aware Routing

    This paper discusses the energy saving control problem in ad hoc wireless networks. The problem can be formulated as a number of randomly placed nodes in a plane with a given area and a required traffic load constrained by end to end delay bounds. The authors try to find an...

    Provided By Ain Shams University

  • White Papers // Jul 2010

    Joint Estimation of IQ Parameters and Channel Response for OFDM Systems

    In this paper, the authors develop a new algorithm to jointly estimate the channel impulse response and Inphase-Quadrature (IQ) imbalances for OFDM systems. The estimation algorithm is based on the Expectation Maximization (EM) algorithm, exploiting information from the pilot symbols and detected data symbols in a systematic fashion. To reduce...

    Provided By Ain Shams University

  • White Papers // Apr 2010

    Lightweight Mutual Authentication Protocol for Low Cost RFID Tags

    Radio Frequency IDentification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode technology. Although it offers many advantages over other identification systems, there are also associated security risks that are not easy to be addressed. When designing a...

    Provided By Ain Shams University

  • White Papers // Jun 2009

    Increasing Server Availability for Overall System Security: A Preventive Maintenance Approach Based on Failure Prediction

    Server Availability (SA) is an important measure of overall systems security. Important security systems rely on the availability of their hosting servers to deliver critical security services. Many of these servers offer management interface through web mainly using an Apache server. This paper investigates the increase of Server Availability by...

    Provided By Ain Shams University

  • White Papers // Mar 2009

    A Genetic Algorithm for Cryptanalysis with Application to DES-like Systems

    Various cryptosystems use exhaustive techniques to search the key space. Such search techniques should be guided in order to be computationally adequate. Here, a Genetic Algorithm, GA, is proposed for the cryptanalysis of DES-like systems to find out the underlying key. The genetic algorithm approach is adopted, for obtaining the...

    Provided By Ain Shams University

  • White Papers // Feb 2009

    Steganography for Voice Over IP (VoIP)

    The functional and cost advantages of Internet telephony are evident. By today's technical standards, however, Voice Over IP (VOIP) is still less secure than traditional telephony. At the same time, the hacker scene is constantly looking for new weak spots and developing ingenious methods of attack to gain access to...

    Provided By Ain Shams University

  • White Papers // Jul 2010

    Joint Estimation of IQ Parameters and Channel Response for OFDM Systems

    In this paper, the authors develop a new algorithm to jointly estimate the channel impulse response and Inphase-Quadrature (IQ) imbalances for OFDM systems. The estimation algorithm is based on the Expectation Maximization (EM) algorithm, exploiting information from the pilot symbols and detected data symbols in a systematic fashion. To reduce...

    Provided By Ain Shams University

  • White Papers // May 2013

    A Database Watermarking Service with a Trusted Authority Architecture for Cloud Environment

    Providing cloud services gets an increasing interest of both scientific and industrial applications today. Storage services are the fundamental component of the Cloud computing paradigm. Exploiting such storage services enables users to outsource their data into the cloud. Not only is the reduction of storage and maintenance costs achieved but...

    Provided By Ain Shams University

  • White Papers // Mar 2009

    A Genetic Algorithm for Cryptanalysis with Application to DES-like Systems

    Various cryptosystems use exhaustive techniques to search the key space. Such search techniques should be guided in order to be computationally adequate. Here, a Genetic Algorithm, GA, is proposed for the cryptanalysis of DES-like systems to find out the underlying key. The genetic algorithm approach is adopted, for obtaining the...

    Provided By Ain Shams University

  • White Papers // Feb 2009

    Steganography for Voice Over IP (VoIP)

    The functional and cost advantages of Internet telephony are evident. By today's technical standards, however, Voice Over IP (VOIP) is still less secure than traditional telephony. At the same time, the hacker scene is constantly looking for new weak spots and developing ingenious methods of attack to gain access to...

    Provided By Ain Shams University

  • White Papers // Apr 2010

    Lightweight Mutual Authentication Protocol for Low Cost RFID Tags

    Radio Frequency IDentification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode technology. Although it offers many advantages over other identification systems, there are also associated security risks that are not easy to be addressed. When designing a...

    Provided By Ain Shams University

  • White Papers // Nov 2010

    Improving the Lifetime of Wireless Ad Hoc Networks Using Power Aware Routing

    This paper discusses the energy saving control problem in ad hoc wireless networks. The problem can be formulated as a number of randomly placed nodes in a plane with a given area and a required traffic load constrained by end to end delay bounds. The authors try to find an...

    Provided By Ain Shams University

  • White Papers // Jun 2009

    Increasing Server Availability for Overall System Security: A Preventive Maintenance Approach Based on Failure Prediction

    Server Availability (SA) is an important measure of overall systems security. Important security systems rely on the availability of their hosting servers to deliver critical security services. Many of these servers offer management interface through web mainly using an Apache server. This paper investigates the increase of Server Availability by...

    Provided By Ain Shams University