Anna University

Displaying 1-40 of 216 results

  • White Papers // May 2014

    Mining Search Log for Privacy Definitions and Phish Safe

    Search engine spamming is a practice of misleading the search engine and increasing the page rank of undeserving websites. The black hat Search Engine Optimization (SEO) techniques lead to untrustworthy results for search engines. Some commonly used black hat techniques has been characterized and proposed a new way to counter...

    Provided By Anna University

  • White Papers // Apr 2014

    Detect SQLI Attacks in Web Apps Using NVS

    Now-a-days the world of information era, the authors can get information just their single click by using web application. Web applications are popular due to the ubiquity of web browsers, and the convenience of using a web browser as a client, sometimes called a thin client. It are playing a...

    Provided By Anna University

  • White Papers // Dec 2013

    Effective Ant Based Routing Algorithm for Data Replication in Manets

    In mobile ad hoc network, the nodes often move and keep on change its topology. Data packets can be forwarded from one node to another on demand. To increase the data accessibility data are replicated at nodes and made as sharable to other nodes. Assuming that all mobile host cooperative...

    Provided By Anna University

  • White Papers // Nov 2013

    Optimization of Vertical Links in a Three-Dimensional NOC Based Multicore Crypto Processor for Cloud Computing

    The popularity of multiprocessors over the last few years has been made possible by Network-on-Chip (NoC). The advent of Three-Dimensional Network-on-Chip (3D NoC) has facilitated the communication in Three-Dimensional Integrated Circuits (3D IC). However, the implementation of 3D NoC is a vital issue with the fabrication of Through-Silicon-Via (TSV), due...

    Provided By Anna University

  • White Papers // Oct 2013

    Cloud Computing Security and Encryption

    Cloud computing has been the talk of the town in the recent years. It has been suggested to everyone to store their data on a cloud. This has led to the birth of a new domain of research. As the cloud technology improves over time, so does the security threats....

    Provided By Anna University

  • White Papers // Sep 2013

    Distributed Heterogeneous Data Management in Grid Computing

    Ensembles of distributed, heterogeneous resources, or computational grids, have emerged as popular platforms for deploying large-scale and resource-intensive applications. Large collaborative efforts are currently underway to provide the necessary software infrastructure. Grid computing raises challenging issues in many areas of computer science, bioinformatics, high energy physics and especially in the...

    Provided By Anna University

  • White Papers // Sep 2013

    S-Spray Routing Protocol for Intermittently Connected Mobile Networks

    The Intermittently Connected Mobile Networks (ICMN) is a disconnected mobile network where a complete connectivity never exists. The intermittent connectivity is due to the dense nature of the network. The dense nature is mainly due to the high mobility of the nodes in the network. Routing in such a sparse...

    Provided By Anna University

  • White Papers // Sep 2013

    Elliptic Curve Cryptography in Securing Networks by Mobile Authentication

    In this paper, the authors propose an enhanced authentication model, which is suitable for low-power mobile devices. It uses an Extended Password Key Exchange Protocols and elliptic-curve-cryptosystem based trust delegation mechanism to generate a delegation pass code for mobile station authentication, and it can effectively defend all known attacks to...

    Provided By Anna University

  • White Papers // Aug 2013

    Data Storage Security in Cloud Using Metadata

    In cloud era as the data stored is away from the user, privacy and integrity of the data plays a crucial role. This paper proposes a practical and efficient method for providing security to the data stored at the data server through metadata. This method provides security using cipher key...

    Provided By Anna University

  • White Papers // Aug 2013

    Attribute Based Secure Data Access in Cloud Computing

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. Attribute based secure data access has proposed for access control of outsourced data in cloud computing. The person wants to sale their business logic to some others with attractive mechanism for showing the...

    Provided By Anna University

  • White Papers // Aug 2013

    Monitoring the User Navigation in the Cloud Application

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new...

    Provided By Anna University

  • White Papers // Jul 2013

    Implementation Strategies for Biometric Fingerprint Authentication for E-Governance Application

    E-Governance applications and services are secured using the key factor called Authentication. Most commonly used credentials for authentication and authorization are user name and password which is not sufficient for security. As Internet is more vulnerable nowadays, one factor authentication alone is not secure and it is more vulnerable for...

    Provided By Anna University

  • White Papers // May 2013

    A Study of Routing Techniques in Intermittently Connected MANETs

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. These are a kind of wireless Ad hoc Networks that usually has a routable networking environment on top of a Link Layer Ad hoc Network. The routing approach in MANET includes mainly three...

    Provided By Anna University

  • White Papers // May 2013

    Third Party Administration Based Security Mechanism for Trusted Ad Hoc Network

    Wireless networks are gaining popularity to its peak today, as the user's wants wireless connectivity irrespective of their geographical location which also increases security problem. There are number of attacks due to lack of trust in wireless network, the idea of enforcing application centric network policy for MANETs from link...

    Provided By Anna University

  • White Papers // May 2013

    An Efficient Approach for Effectual Mining of Relational Patterns from Multi-Relational Database

    Data mining is an extremely challenging and hopeful research topic due to its well-built application potential and the broad accessibility of the massive quantities of data in databases. Still, the rising significance of data mining in practical real world necessitates ever more complicated solutions while data includes of a huge...

    Provided By Anna University

  • White Papers // May 2013

    Forward Error Correction Code for MIMO-OFDM System in AWGN and Rayleigh Fading Channel

    Orthogonal Frequency Division Multiplexing (OFDM) is a popular method for high data rate wireless transmission. OFDM may be combined with antenna arrays at the transmitter and receiver to increase the diversity gain and/or to enhance the system capacity on time-variant and frequency-selective channels, resulting in a Multiple-Input Multiple-Output (MIMO) configuration....

    Provided By Anna University

  • White Papers // May 2013

    A Security Gateway for Message Exchange in Services by Streaming and Validation

    Cloud Computing is found to be today's most commonly used Service Oriented Architecture (SOA) implementation. Cloud services are exposed as Web Services which follow the industry standards such as WSDL for service description, SOAP for enabling request and response and so on. Hence Web services security is of particular importance...

    Provided By Anna University

  • White Papers // Apr 2013

    Byzantine Fault Tolerance Based Security Challenges for The Privacy Preserving Public Cloud

    Cloud computing make it possible to store large amounts of data. To monitoring User an entity whose data to be stores in the cloud and relies on the cloud for data storage and computation, server is an entity which manages by cloud service provider to provide data storage service and...

    Provided By Anna University

  • White Papers // Mar 2013

    Error Correction for a Secure Multicast Group Key Management Using Gray Code

    Key agreement protocols are designed to provide two or more specified parties communicating over public channels with a common shared secret key, which may subsequently be used to exchange information among communicating parties. Therefore, building secure key agreement protocols over open networks is essential in information security. Error Correcting Codes...

    Provided By Anna University

  • White Papers // Mar 2013

    Security System Based on Viola Jones Detection

    Iris recognition is a biometric system for access control that uses the most unique characteristic of the human body, the iris employed in automated border crossings, national ID systems, etc. This paper illustrates techniques to improve performance of iris recognition system based on stationary images using NI LabVIEW (Vision Module)....

    Provided By Anna University

  • White Papers // Mar 2013

    Modified Optimal Performance Mapping on Reconfigurable Architecture for Multimedia Applications

    In this paper, Coarse-Grained Reconfigurable Architectures (CGRAs) are capable of achieving both goals of high performance and flexibility. CGRAs not only improve performance by exploiting the features of repetitive computations, but also can adapt to diverse computations by dynamically changing configurations of an array of its internal Processing Elements (PEs)...

    Provided By Anna University

  • White Papers // Mar 2013

    An Energy Efficient Analysis of S-Mac and H-Mac Protocols for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) is an interesting topic to the researchers because of its various applications. The applications are health monitoring and environmental monitoring, Industrial Process Monitoring, Target detection, Target tracking, Energy Efficiency, Disaster Management and Military Security Systems. The wireless medium requires highly optimized medium Access Protocols to avoid...

    Provided By Anna University

  • White Papers // Mar 2013

    A Survey on Modeling and Enhancing Reliability of Wireless Sensor Network

    Design of reliable Wireless Sensor Network (WSN) needs to address the failure of single or multiple network components and implementation of the techniques to tolerate the faults occurred at various levels. The issues and requirements of reliability improvement mechanism depend on the available resources and application for which the WSN...

    Provided By Anna University

  • White Papers // Mar 2013

    Encrypted Data Storage in Cloud Environment

    Cloud Computing is the use of computing resources that are deliverable as a service over a network. Cloud computing relies on sharing of resources to achieve coherence. The cloud server may leak data information due to unauthorized entities or even be hacked. Encrypted storage and retrieval model is used. Searchable...

    Provided By Anna University

  • White Papers // Feb 2013

    Information Retrieval Based on Semantic Matching Approach in Web Service Discovery

    Information retrieval from web has been a tough task due to an increased amount of contents dynamically day by day. In that current information retrieval results are only based on syntactic description for web service which may not provide an accurate solution for all service requests. On the other hand...

    Provided By Anna University

  • White Papers // Feb 2013

    An Unsupervised Model to detect Web Spam Based on Qualified Link Analysis and Language Models

    With the massive use of the internet and the search engines, a major problem that comes to light is the Web Spam. Web spam can be detected by analyzing the various features of web pages and categorizing them as belonging to the spam or non-spam category. The proposed work considers...

    Provided By Anna University

  • White Papers // Jan 2013

    Securing and Managing the Data With Efficient Architecture in Cloud Computing Environment

    Cloud computing technology and services has become an important issue in the recent years. Cloud Computing needs lot of attention, time and innovative concepts for the technology to mature over a period of time. Many organizations show interest in adopting cloud computing technology and services because of its socio economic...

    Provided By Anna University

  • White Papers // Jan 2013

    Maximization of Lifetime and Reducing Power Consumption in Wireless Sensor Network Using Protocol

    This paper is to avoid duplicate transmission, node reconfiguration and power consumption in Wireless Sensor Networks (WSN). Wireless sensor network requires robust and energy efficient communication protocols to minimize the energy consumption as much as possible. However, the lifetime of sensor network reduces due to the adverse impacts caused by...

    Provided By Anna University

  • White Papers // Jan 2013

    Survey of Mapping XML DTDs (Documents) to Relational Schemas

    Extensible Markup Language (XML) is emerging as the data format of the web era. XML has the characteristics, such as the extensibility and self-description, which make it becomes a criterion of data exchanging between applications. In recent years, XML has become the standard format of data representation and exchange in...

    Provided By Anna University

  • White Papers // Jan 2013

    Towards Fault Handling in B2B Collaboration Using Orchestration Based Web Services Composition

    Recently, Web Services Composition is receiving significant amount of interest as an important strategy to allow Business-to-Business collaboration. The current Web Services composition solutions are inherently unreliable, so how to deliver reliable Web Services composition over unreliable web services is a significant and challenging problem. In this paper, the authors...

    Provided By Anna University

  • White Papers // Nov 2012

    A Mobile Payment System Through Independent M-Signature Service

    Nowadays a great number of applications require the use of Electronic Signature (e-signature) and non-repudiation services such as certified e-mail, contract signing, electronic payment system and etc... The authenticity and integrity generated by e-signature in electronic document is like a handwritten signature in the paper document. The mobile user would...

    Provided By Anna University

  • White Papers // Nov 2012

    Security Implications of Distributed Database Management System Models

    Security features must be addressed when escalating a distributed database. The choice between the object oriented and the relational data model, several factors should be considered. The most important of these factors are single and Multilevel Access Controls (MAC), protection and integrity maintenance. While determining which distributed database replica will...

    Provided By Anna University

  • White Papers // Nov 2012

    Non Linear Optimum Filtering and Smoothing Based IMM in GPS Navigation

    The information from Global Positioning System (GPS) has been increasingly used in many applications. Navigation is one of the important applications. To estimate the state of the vehicle, Kalman Filter (KF) is used traditionally. Since KF gives inaccurate results during non linear motion of the vehicle, an Unscented Kalman Filter...

    Provided By Anna University

  • White Papers // Nov 2012

    A Secure Key Transfer Protocol for Group Communication

    Providing security for messages in group communication is more essential and critical nowadays. In group oriented applications such as Video conferencing and entertainment applications, it is necessary to secure the confidential data in such a way that intruders are not able to modify or transmit the data. Key transfer protocols...

    Provided By Anna University

  • White Papers // Nov 2012

    Energy Reduction Routing In Wireless Ad-Hoc Network

    Ad hoc networks are dynamically created and maintained by the individual nodes comprising the network. They do not require a pre-existing architecture for communication purposes and do not rely on any type of wired infrastructure; in an ad hoc network all communication occurs through a wireless median. The main objective...

    Provided By Anna University

  • White Papers // Oct 2012

    PKI Based Signcryption without Pairing: An Efficient Scheme with Tight Security Reduction

    Signcryption is a cryptographic primitive that fulfill the functionalities of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional sign-then-encrypt or encrypt-then-sign approach. In this paper, the authors address the question whether it is feasible to construct a PKI based signcryption...

    Provided By Anna University

  • White Papers // Oct 2012

    Multilayer Image Watermarking Scheme for Providing High Security

    The main theme of this application is to provide an algorithm color image watermark to manage the attacks such as rotation, scaling and translation. In the existing watermarking algorithms, those exploited robust features are more or less related to the pixel position, so they cannot be more robust against the...

    Provided By Anna University

  • White Papers // Oct 2012

    A New Optimal Reverse Reactive Routing Protocol for the Shortest Route in Ad Hoc Networks

    In this paper, the authors propose a mechanism in which power consumption in a sensor network can be reduced greatly by taking into account the fairness factors and to increase the probability of nodes for successful packet transmission with lowest possible Signal to Noise Ratio (SNR) in a crowded environment....

    Provided By Anna University

  • White Papers // Sep 2012

    L Diversity on K-Anonymity With External Database for Improving Privacy Preserving Data Publishing

    The data must be secure and measurable at the public when it releases to view. The data table produces personal information and sensitive values. They are maintained for secrecy, the anonymity is the best method to protect the data. There are many anonymity methods to protect the data. k -anonymity...

    Provided By Anna University

  • White Papers // Sep 2012

    A QoS Towards Dynamic Web Services Recapitulation and Selection

    Web services are the components, communicates via Internet or Web. Fundamental vision of the Web service is a brokerage system. The Recapitulation of Web service is an approach for the effective integration of distributed, heterogeneous and autonomous applications to build more Structured and value added services. Web services selection algorithms...

    Provided By Anna University

  • White Papers // Dec 2009

    Orthogonal Frequency Division Multiple Access in WiMAX and LTE - A Comparison

    Orthogonal Frequency Division Multiple Access (OFDMA) has been adopted by all the proposals which have been considered for the Fourth Generation (4G) wireless technologies. Specifically, the two main contenders in the 4G marketplace are likely to be evolutions of WiMAX and LTE. In this paper, the authors compare the use...

    Provided By Anna University

  • White Papers // Jan 2010

    Design of MEMS Components for All-Optical Code Based Router

    A novel code based all-optical router using MEMS components is presented in this paper. The proposed architecture of the router is given. The router is configured using MEMS optical filters, MEMS optical switches, circulators and combiners. In this paper, simulation is carried out for MEMS optical filters and optical switches...

    Provided By Anna University

  • White Papers // Jul 2012

    Handoff Mobiles with Low Latency in Heterogeneous Networks for Seamless Mobility: A Survey and Future Directions

    As the number of mobiles and mobile networks increases every year, the authors are facing new problems and challenges in incorporate various networks with various standards and technologies. In that the problem of handoff is a big parameter which affects the performance dramatically. Many ideas and schemes for handoff mobiles...

    Provided By Anna University

  • White Papers // Apr 2012

    Cloudpress 2.0: A MapReduce Approach for News Retrieval on the Cloud

    In this era of the Internet, the amount of news articles added every minute of every day is humongous. As a result of this explosive amount of news articles, news retrieval systems are required to process the news articles frequently and intensively. The news retrieval systems that are in-use today...

    Provided By Anna University

  • White Papers // Nov 2012

    A Secure Key Transfer Protocol for Group Communication

    Providing security for messages in group communication is more essential and critical nowadays. In group oriented applications such as Video conferencing and entertainment applications, it is necessary to secure the confidential data in such a way that intruders are not able to modify or transmit the data. Key transfer protocols...

    Provided By Anna University

  • White Papers // Nov 2012

    A Mobile Payment System Through Independent M-Signature Service

    Nowadays a great number of applications require the use of Electronic Signature (e-signature) and non-repudiation services such as certified e-mail, contract signing, electronic payment system and etc... The authenticity and integrity generated by e-signature in electronic document is like a handwritten signature in the paper document. The mobile user would...

    Provided By Anna University

  • White Papers // Nov 2012

    Non Linear Optimum Filtering and Smoothing Based IMM in GPS Navigation

    The information from Global Positioning System (GPS) has been increasingly used in many applications. Navigation is one of the important applications. To estimate the state of the vehicle, Kalman Filter (KF) is used traditionally. Since KF gives inaccurate results during non linear motion of the vehicle, an Unscented Kalman Filter...

    Provided By Anna University

  • White Papers // Sep 2011

    NETRAWALM: Network Based Resource Aware Application Layer Multicast for Multiparty Video Conference

    IP Multicast is one of the most absolute methods for large bandwidth Internet applications such as video conference, IPTV, E-Learning and Telemedicine etc., but due to security and management reason IP Multicast is not enabled in Internet backbone routers. To achieve these challenges, lot of Application Layer Multicast (ALM) has...

    Provided By Anna University

  • White Papers // Sep 2011

    Energy, Throughput and Area Evaluation of Regular and Irregular Network on Chip Architectures

    Network-on-chip has been proposed in System-on-Chip to achieve high performance, reusability and scalability through generating application specific topologies. Application specific topologies are irregular in structure and take into account certain factors like communication weight, area and energy constraints while building up the topology. Regular topologies like 2D mesh, spidergon are...

    Provided By Anna University

  • White Papers // May 2011

    An Energy Efficient Spatial Correlation Based Data Gathering Algorithm for Wireless Sensor Networks

    Wireless sensor networks have a wide range of applications including environmental monitoring. These networks consist of wireless sensor nodes which are densely deployed to provide a wider coverage area. The dense deployment of the sensor node provides spatial correlation in the network. In this paper, an efficient data gathering approach...

    Provided By Anna University

  • White Papers // Jan 2013

    Maximization of Lifetime and Reducing Power Consumption in Wireless Sensor Network Using Protocol

    This paper is to avoid duplicate transmission, node reconfiguration and power consumption in Wireless Sensor Networks (WSN). Wireless sensor network requires robust and energy efficient communication protocols to minimize the energy consumption as much as possible. However, the lifetime of sensor network reduces due to the adverse impacts caused by...

    Provided By Anna University

  • White Papers // Sep 2012

    L Diversity on K-Anonymity With External Database for Improving Privacy Preserving Data Publishing

    The data must be secure and measurable at the public when it releases to view. The data table produces personal information and sensitive values. They are maintained for secrecy, the anonymity is the best method to protect the data. There are many anonymity methods to protect the data. k -anonymity...

    Provided By Anna University

  • White Papers // Sep 2012

    A QoS Towards Dynamic Web Services Recapitulation and Selection

    Web services are the components, communicates via Internet or Web. Fundamental vision of the Web service is a brokerage system. The Recapitulation of Web service is an approach for the effective integration of distributed, heterogeneous and autonomous applications to build more Structured and value added services. Web services selection algorithms...

    Provided By Anna University

  • White Papers // Apr 2012

    Establishment of Secure Communication in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consists of small nodes with constrained capabilities to sense, collect, and disseminate information in many types of applications. Wireless Sensor Networks (WSN) have attracted significant interests from the research community in a wide range of applications such as target tracking, environment monitoring, military sensing, distributed measurement...

    Provided By Anna University

  • White Papers // Aug 2012

    Multimedia Transmission in Multi Hop Wireless Sensor Network

    Quality of Service (QoS) is a requirement for proper functioning of traditional and modern networks. Wireless Sensor Networks (WSN) is adversely affected because of mobility, harsh communication medium, and environment behavior. Quality of Service is a crucial aspect in WSN design information sent by nodes and delivered according to QoS...

    Provided By Anna University

  • White Papers // Feb 2012

    Location Management Using Genetic Algorithm Tuned Neural Network in Mobile Networks

    In this paper, the authors present a User Pattern Learning (UPL) strategy using Genetic Algorithm tuned Artificial Neural Network (GAANN) to reduce the location update cost. The system maintains a list of places where each user is most likely to be in at each time interval. The intelligence of the...

    Provided By Anna University

  • White Papers // Jan 2013

    Survey of Mapping XML DTDs (Documents) to Relational Schemas

    Extensible Markup Language (XML) is emerging as the data format of the web era. XML has the characteristics, such as the extensibility and self-description, which make it becomes a criterion of data exchanging between applications. In recent years, XML has become the standard format of data representation and exchange in...

    Provided By Anna University

  • White Papers // Feb 2012

    An Integrated Cross Layer Approach for Multimedia Streaming Using Multipath and Multiple Description Coding in Mobile Ad-Hoc Networks

    This paper is to propose a novel method for enhancing the QoS of multimedia applications in mobile ad hoc networks by using Multipath and Multi Description Coding. The enhancement is achieved by implementing the Multi Description Coding (MDC) at application layer along with Connectionless Light Weight Protocol (UDPLite) in transport...

    Provided By Anna University

  • White Papers // Feb 2012

    A New Adaptive Model for Throughput Enhancement and Optimal Relay Selection in IEEE 802.16j Networks

    IEEE 802.16 standard is created to compete with cable access networks. In the beginning end users are immobile and have a line of sight with base station, now it moved to mobile Non Line Of Sight (NLOS) with the new standard IEEE 802.16e and IEEE 802.16j. The new IEEE 802.16j...

    Provided By Anna University

  • White Papers // Apr 2011

    Video Summary Application Over Cross-Layer Designed Wireless Networks Using Multi-Carrier CDMA

    Cross-layer design has become an emerging trend in the wireless network for efficient video transmission. In this paper, a cross-layer design approach is proposed for multi-user scenario by using Multiple-Input Multiple-Output antennas (MIMO) at the physical layer. The impact of multi-user system on the bit error rate performance is presented...

    Provided By Anna University

  • White Papers // Apr 2011

    Energy Efficient Constant Cluster Node Scheduling Protocol for Wireless Sensor Networks

    The Wireless Sensor Network (WSN) consisting of a large number of sensors are effective for gathering data in a variety of environments. In this paper, the authors first completely analyzes the basic distributed clustering routing protocol LEACH (Low Energy Adaptive Clustering Hierarchy), then proposed a new routing protocol and data...

    Provided By Anna University

  • White Papers // Jul 2011

    Terminator for E-mail Spam - A Fuzzy Approach Revealed

    In this information technology world, the highest degree of communication happens through e-mails. Realistically most of the inboxes are flooded with spam e-mails as most of transactions through this internet is affected by passive attacks and active attacks. Several algorithms exist in the e-world to defend against spam e-mails. But...

    Provided By Anna University

  • White Papers // Oct 2012

    PKI Based Signcryption without Pairing: An Efficient Scheme with Tight Security Reduction

    Signcryption is a cryptographic primitive that fulfill the functionalities of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional sign-then-encrypt or encrypt-then-sign approach. In this paper, the authors address the question whether it is feasible to construct a PKI based signcryption...

    Provided By Anna University

  • White Papers // Aug 2012

    CDRA: Consistency Based Data Replication Algorithm for MANET

    Mobile Ad hoc NETwork (MANET) consists of mobile nodes which are connected without any centralized administration. The main popularity of MANET is to ensure that lack of infrastructure, self organization and no access point. Mobile nodes are sharing their data whenever and wherever it's needed. To maintain the effective data...

    Provided By Anna University

  • White Papers // Jul 2012

    Intrusion Detection System Designed for Wireless Using JADE Mobile Agent Framework

    In wireless environment the system allows the end users to use the application without installation and access their personal files at any computer with internet access. Apart from the advantages of wireless network, security is the major issue. Due to the distributed nature, wireless environment is an easy target for...

    Provided By Anna University

  • White Papers // Nov 2010

    The Extraction of the Tooth Contour for Biometric Identification Device

    The contours of the teeth are important features in dental biometrics. They can be utilized as cues for identifying individuals. The extraction of other features (e.g., the dental work) also needs the contours of teeth as reference. However, without the proper guidance of tooth shape knowledge, these methods are subject...

    Provided By Anna University

  • White Papers // Aug 2013

    Attribute Based Secure Data Access in Cloud Computing

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. Attribute based secure data access has proposed for access control of outsourced data in cloud computing. The person wants to sale their business logic to some others with attractive mechanism for showing the...

    Provided By Anna University

  • White Papers // Aug 2013

    Monitoring the User Navigation in the Cloud Application

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new...

    Provided By Anna University

  • White Papers // May 2013

    Third Party Administration Based Security Mechanism for Trusted Ad Hoc Network

    Wireless networks are gaining popularity to its peak today, as the user's wants wireless connectivity irrespective of their geographical location which also increases security problem. There are number of attacks due to lack of trust in wireless network, the idea of enforcing application centric network policy for MANETs from link...

    Provided By Anna University

  • White Papers // Sep 2013

    Distributed Heterogeneous Data Management in Grid Computing

    Ensembles of distributed, heterogeneous resources, or computational grids, have emerged as popular platforms for deploying large-scale and resource-intensive applications. Large collaborative efforts are currently underway to provide the necessary software infrastructure. Grid computing raises challenging issues in many areas of computer science, bioinformatics, high energy physics and especially in the...

    Provided By Anna University

  • White Papers // Nov 2012

    Security Implications of Distributed Database Management System Models

    Security features must be addressed when escalating a distributed database. The choice between the object oriented and the relational data model, several factors should be considered. The most important of these factors are single and Multilevel Access Controls (MAC), protection and integrity maintenance. While determining which distributed database replica will...

    Provided By Anna University

  • White Papers // Aug 2012

    Enhanced RSACRT for Energy Efficient Authentication to Wireless Sensor Networks Security

    The Security in WSN has become a challenge because of its inherent limitations of resources imposed on the sensor nodes. Authentication and key management scheme allows WSNs to be used with confidence and maintains integrity of data in sensor networks. Approach: In the WSN limited resource scenario the generation of...

    Provided By Anna University

  • White Papers // May 2012

    Multi Factor Authentication Protocols for a Secured Wsn

    WSN is an embedded system with the network properties of self configuration, self healing, dynamic routing and multi hop communication and sensor nodes are scattered in sensor field. WSN is ubiquitous in nature but nodes have limited energy resources and memory constraints, the protocols designed for sensor networks should be...

    Provided By Anna University

  • White Papers // Mar 2012

    Message Level Security Realization in Web Services Using AES and Diffie Hellman Key Exchange

    Major usage of Internet elevates the significance of web services, which in turn makes web service security a very challenging issue. Web Service uses SOAP to exchange information; although SOAP guarantees XML security, XML is still liable to attacks like XML rewriting, XML bombing, external entry attack, denial of service...

    Provided By Anna University

  • White Papers // Mar 2010

    Analysis of Supply Chain Network Using RFID Technique with Hybrid Algorithm

    Radio Frequency IDentification (RFID) is a dedicated short range communication technology. The term RFID is used to describe various technologies that use radio waves to automatically identify people or objects. RFID is a method of remotely storing and retrieving data using RFID tag. Radio Frequency IDentification (RFID) technology has been...

    Provided By Anna University

  • White Papers // Apr 2010

    A Model of Cloud Based Application Environment for Software Testing

    Cloud computing is an emerging platform of service computing designed for swift and dynamic delivery of assured computing resources. Cloud computing provide Service-Level Agreements (SLAs) for guaranteed uptime availability for enabling convenient and on-demand network access to the distributed and shared computing resources. Though the cloud computing paradigm holds its...

    Provided By Anna University

  • White Papers // Oct 2013

    Cloud Computing Security and Encryption

    Cloud computing has been the talk of the town in the recent years. It has been suggested to everyone to store their data on a cloud. This has led to the birth of a new domain of research. As the cloud technology improves over time, so does the security threats....

    Provided By Anna University

  • White Papers // May 2013

    An Efficient Approach for Effectual Mining of Relational Patterns from Multi-Relational Database

    Data mining is an extremely challenging and hopeful research topic due to its well-built application potential and the broad accessibility of the massive quantities of data in databases. Still, the rising significance of data mining in practical real world necessitates ever more complicated solutions while data includes of a huge...

    Provided By Anna University

  • White Papers // May 2012

    An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad-Hoc Networks

    In Mobile Ad-hoc NETworks (MANETs), it is easy to launch wormhole, man-in-the-middle and Denial of Service (DoS) attacks, or to impersonate another node. The authors' previous work established a network consisting confidentiality and authentication of packets in both routing and link layers. In this paper, they propose to develop an...

    Provided By Anna University

  • White Papers // Jul 2013

    Implementation Strategies for Biometric Fingerprint Authentication for E-Governance Application

    E-Governance applications and services are secured using the key factor called Authentication. Most commonly used credentials for authentication and authorization are user name and password which is not sufficient for security. As Internet is more vulnerable nowadays, one factor authentication alone is not secure and it is more vulnerable for...

    Provided By Anna University