Avinashilingam University for Women

Displaying 1-11 of 11 results

  • White Papers // Jan 2011

    FAVQCHOKE: To Allocate Fair Buffer to a Dynamically Varying Traffic in an IP Network

    In IP networks, AQM attempts to provide high network utilization with low loss and low delay by regulating queues at bottleneck links. Many AQM algorithms have been proposed, most suffer from instability of queue, bursty packet drop, require careful configuration of control parameters, or slow response to dynamic traffic changes...

    Provided By Avinashilingam University for Women

  • White Papers // Sep 2010

    Securing Revocable Iris and Retinal Templates Using Combined User and Soft Biometric Based Password Hardened Multimodal Fuzzy Vault

    Biometric systems are subjected to a variety of attacks. Stored biometric template attack is very severe compared to all other attacks. Providing security to biometric templates is an important issue in building a reliable personal identification system. Multi biometric systems are more resistive towards spoof attacks compared to unibiometric counterpart....

    Provided By Avinashilingam University for Women

  • White Papers // Sep 2010

    Dynamic Clustering for QoS Based Secure Multicast Key Distribution in Mobile Ad Hoc Networks

    Many emerging applications in mobile ad hoc networks involve group-oriented communication. Multicast is an efficient way of supporting group oriented applications, mainly in mobile environment with limited bandwidth and limited power. For using such applications in an adversarial environment as military, it is necessary to provide secure multicast communication. Key...

    Provided By Avinashilingam University for Women

  • White Papers // Mar 2010

    Secure Multicast Key Distribution for Mobile Adhoc Networks

    Many emerging applications in mobile adhoc networks involve group-oriented communication. Multicast is an efficient way of supporting group oriented applications, mainly in mobile environment with limited bandwidth and limited power. For using such applications in an adversarial environment as military, it is necessary to provide secure multicast communication. Key management...

    Provided By Avinashilingam University for Women

  • White Papers // Feb 2010

    Securing Iris Templates Using Combined User and Soft Biometric Based Password Hardened Fuzzy Vault

    Personal identification and authentication is very crucial in the current scenario. Biometrics plays an important role in this area. Biometric based authentication has proved superior compared to traditional password based authentication. Anyhow biometrics is permanent feature of a person and cannot be reissued when compromised as passwords. To over come...

    Provided By Avinashilingam University for Women

  • White Papers // Jan 2010

    A Performance Study of GA and LSH in Multiprocessor Job Scheduling

    Multiprocessor task scheduling is an important and computationally difficult problem. This paper proposes a comparison study of genetic algorithm and list scheduling algorithm. Both algorithms are naturally parallelizable but have heavy data dependencies. Based on experimental results, this paper presents a detailed analysis of the scalability, advantages and disadvantages of...

    Provided By Avinashilingam University for Women

  • White Papers // Oct 2009

    Cluster Based Multicast Tree for Secure Multicast Key Distribution in Mobile Adhoc Networks

    Secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Hence key management is the fundamental challenge in achieving secure communication using multicast key distribution...

    Provided By Avinashilingam University for Women

  • White Papers // Oct 2009

    A Survey of Biometric Keystroke Dynamics: Approaches, Security and Challenges

    Biometrics technologies are gaining popularity today since they provide more reliable and efficient means of authentication and verification. Keystroke Dynamics is one of the famous biometric technologies, which will try to identify the authenticity of a user when the user is working via a keyboard. The authentication process is done...

    Provided By Avinashilingam University for Women

  • White Papers // Oct 2009

    Password Hardened Multimodal Biometric Fuzzy Vault With Feature Points Extracted From Retina and Iris

    Biometric techniques are gaining importance for personal authentication and identification as compared to the traditional authentication methods. Biometric templates are vulnerable to variety of attacks due to their inherent nature. When a person's biometric is compromised his identity is lost. In contrast to password, biometric is not revocable. Therefore, providing...

    Provided By Avinashilingam University for Women

  • White Papers // Sep 2009

    A Reliable Secure Multicast Key Distribution Scheme for Mobile Adhoc Networks

    Reliable secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Many emerging commercial and military applications require secure multicast communication in adhoc environments. Hence...

    Provided By Avinashilingam University for Women

  • White Papers // Sep 2009

    A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks

    Wireless Sensor Networks (WSN) is an emerging technology and have great potential to be employed in critical situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring and smart homes and many more scenarios. One of the major challenges wireless sensor networks face today is security. While...

    Provided By Avinashilingam University for Women

  • White Papers // Oct 2009

    Cluster Based Multicast Tree for Secure Multicast Key Distribution in Mobile Adhoc Networks

    Secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Hence key management is the fundamental challenge in achieving secure communication using multicast key distribution...

    Provided By Avinashilingam University for Women

  • White Papers // Oct 2009

    Password Hardened Multimodal Biometric Fuzzy Vault With Feature Points Extracted From Retina and Iris

    Biometric techniques are gaining importance for personal authentication and identification as compared to the traditional authentication methods. Biometric templates are vulnerable to variety of attacks due to their inherent nature. When a person's biometric is compromised his identity is lost. In contrast to password, biometric is not revocable. Therefore, providing...

    Provided By Avinashilingam University for Women

  • White Papers // Sep 2009

    A Reliable Secure Multicast Key Distribution Scheme for Mobile Adhoc Networks

    Reliable secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Many emerging commercial and military applications require secure multicast communication in adhoc environments. Hence...

    Provided By Avinashilingam University for Women

  • White Papers // Jan 2011

    FAVQCHOKE: To Allocate Fair Buffer to a Dynamically Varying Traffic in an IP Network

    In IP networks, AQM attempts to provide high network utilization with low loss and low delay by regulating queues at bottleneck links. Many AQM algorithms have been proposed, most suffer from instability of queue, bursty packet drop, require careful configuration of control parameters, or slow response to dynamic traffic changes...

    Provided By Avinashilingam University for Women

  • White Papers // Sep 2010

    Securing Revocable Iris and Retinal Templates Using Combined User and Soft Biometric Based Password Hardened Multimodal Fuzzy Vault

    Biometric systems are subjected to a variety of attacks. Stored biometric template attack is very severe compared to all other attacks. Providing security to biometric templates is an important issue in building a reliable personal identification system. Multi biometric systems are more resistive towards spoof attacks compared to unibiometric counterpart....

    Provided By Avinashilingam University for Women

  • White Papers // Sep 2010

    Dynamic Clustering for QoS Based Secure Multicast Key Distribution in Mobile Ad Hoc Networks

    Many emerging applications in mobile ad hoc networks involve group-oriented communication. Multicast is an efficient way of supporting group oriented applications, mainly in mobile environment with limited bandwidth and limited power. For using such applications in an adversarial environment as military, it is necessary to provide secure multicast communication. Key...

    Provided By Avinashilingam University for Women

  • White Papers // Oct 2009

    A Survey of Biometric Keystroke Dynamics: Approaches, Security and Challenges

    Biometrics technologies are gaining popularity today since they provide more reliable and efficient means of authentication and verification. Keystroke Dynamics is one of the famous biometric technologies, which will try to identify the authenticity of a user when the user is working via a keyboard. The authentication process is done...

    Provided By Avinashilingam University for Women

  • White Papers // Sep 2009

    A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks

    Wireless Sensor Networks (WSN) is an emerging technology and have great potential to be employed in critical situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring and smart homes and many more scenarios. One of the major challenges wireless sensor networks face today is security. While...

    Provided By Avinashilingam University for Women

  • White Papers // Jan 2010

    A Performance Study of GA and LSH in Multiprocessor Job Scheduling

    Multiprocessor task scheduling is an important and computationally difficult problem. This paper proposes a comparison study of genetic algorithm and list scheduling algorithm. Both algorithms are naturally parallelizable but have heavy data dependencies. Based on experimental results, this paper presents a detailed analysis of the scalability, advantages and disadvantages of...

    Provided By Avinashilingam University for Women

  • White Papers // Mar 2010

    Secure Multicast Key Distribution for Mobile Adhoc Networks

    Many emerging applications in mobile adhoc networks involve group-oriented communication. Multicast is an efficient way of supporting group oriented applications, mainly in mobile environment with limited bandwidth and limited power. For using such applications in an adversarial environment as military, it is necessary to provide secure multicast communication. Key management...

    Provided By Avinashilingam University for Women

  • White Papers // Feb 2010

    Securing Iris Templates Using Combined User and Soft Biometric Based Password Hardened Fuzzy Vault

    Personal identification and authentication is very crucial in the current scenario. Biometrics plays an important role in this area. Biometric based authentication has proved superior compared to traditional password based authentication. Anyhow biometrics is permanent feature of a person and cannot be reissued when compromised as passwords. To over come...

    Provided By Avinashilingam University for Women