Creative Commons

Displaying 1-40 of 5366 results

  • White Papers // Feb 2015

    Integrity Verification in Multi-Cloud Storage by Efficient Cooperative Provable Data Possession

    Provable Data Possession (PDP) is one of the procedure to make sure the integrity of data in storage outsourcing. Here in this paper, the authors talk to the creation of an efficient PDP method for distributed cloud storage to preserve the scalability of service and data migration. On the origin...

    Provided By Creative Commons

  • White Papers // Feb 2015

    Comparative Study of Asymmetric Key Cryptographic Algorithms

    Today security is the challenging aspect in internet and network application. Cryptography is the study of mathematical techniques related to various aspects of information security, such as confidentiality or privacy, data integrity and entity authentication. Cryptography is one of the main constituents of computer security. Public cryptography is the art...

    Provided By Creative Commons

  • White Papers // Feb 2015

    Effective Lossless Authentication in Video for Data Embedding Application

    A video data embedding scheme in which the embedded signature data is reconstructed without knowing the original host video. Signature data is embedded in individual video frames using the block BinDCT. At the receiver, both the host and signature images are recovered from the embedded bit stream. Lossless authentication achieves...

    Provided By Creative Commons

  • White Papers // Feb 2015

    KNN Query Processing of Secured Multi Data Owner Using Voronoi Diagram

    An economical and flexible way to data owners for delivering spatial data to users of location-based services would be Outsourcing spatial databases to the cloud. In this data outsourcing model the service provider can be untrustworthy. It may return incorrect or incomplete query results to clients intentionally or not. Ensuring...

    Provided By Creative Commons

  • White Papers // Feb 2015

    MSL Based Concurrent and Efficient Priority Queue

    Priority queues are fundamental in the design of modern multiprocessor algorithms. Priority queues with parallel access are an attractive data structure for applications like prioritized online scheduling, discrete event simulation, or branch-and-bound. This paper proposes an alternative approach: to base the design of concurrent priority queues on the modified skip...

    Provided By Creative Commons

  • White Papers // Feb 2015

    Efficient and Secure Scheme for Distributed Data Storage Systems

    The burden of maintaining a large number of files from the owner to proxy servers can be shifted by usage of secure distributed data storage. Generally proxy servers can convert encrypted files of the owner to encrypted files for the receiver without any knowledge on the content of the original...

    Provided By Creative Commons

  • White Papers // Feb 2015

    Dynamic Cluster Based Intrusion Detection System in Mobile Ad-hoc Networks

    Security is an important concern in mobile ad-hoc network environment caused by nature of dynamic topology. In Mobile Ad-hoc NETwork (MANET) multiple nodes moves from one position to another position in same transmission range due mobility. In this paper, the authors have described a design and implementation of dynamic cluster...

    Provided By Creative Commons

  • White Papers // Feb 2015

    Prioritization of Re-Executable Test Cases in Model Based Environment-A Survey

    "In case of regression testing and prioritization approaches, specification level design and requirements concerns motivate changes in the source code. Traditional approaches are bottom up (or white box) and do not leverage on these concerns, so the new concept which considers these concerns is developed called as model based testing...

    Provided By Creative Commons

  • White Papers // Feb 2015

    Dynamic Multi-Keyword Ranked Searchable Security Algorithm Using CRSA and B-Tree

    "With the advantage of storage as a service many enterprises are moving their valuable data to the cloud, since it costs less, easily scalable and can be accessed from anywhere any time. The trust between cloud user and provider is paramount. The authors use security as a parameter to establish...

    Provided By Creative Commons

  • White Papers // Feb 2015

    Securely Sharing Of Data with Others in Cloud Storage Using Public-Key Cryptosystem

    "Cloud storage could be a storage of information on-line in cloud that is accessible from multiple and connected resources. Cloud storage will offer smart accessibility and reliability, sturdy protection, disaster recovery, and lowest price. Cloud storage having vital practicality i.e. securely, with efficiency, flexibly sharing information with others. New public-key...

    Provided By Creative Commons

  • White Papers // Feb 2015

    Public Key Cryptosystem for Scalable Data Sharing in Cloud Storage

    "New computing paradigms keep rising. One notable example is that the cloud computing paradigm, a replacement economic computing model created attainable by the advances in networking technology, wherever a consumer will leverage a service provider's computing, storage or networking infrastructure. The requirements of information security at intervals a corporation have...

    Provided By Creative Commons

  • White Papers // Feb 2015

    Survey on Geographical Routing Protocols in Network-Centric Warfare Paradigm

    "Mobile Ad-hoc NETwork (MANET) allows portable devices to establish communication independent of a central infrastructure. The wireless links in this network are highly error prone and can go down frequently due to mobility of nodes. Therefore, routing in MANET is a critical task due to highly dynamic environment. Efficient Routing...

    Provided By Creative Commons

  • White Papers // Feb 2015

    Survey on Different Types of Security Threats on Wireless Sensor Networks

    A Wireless Sensor Network (WSN) consists of spatially distributed autonomous sensors. WSNs are vulnerable to security attacks due to the broadcast nature of radio transmission. This paper provides a study of different types of security attacks in WSNs. The focus has been on the sleep deprivation torture (denial-of-sleep) attack which...

    Provided By Creative Commons

  • White Papers // Feb 2015

    A Novel Framework for Biometric Authentication Using Segmentation of Iris Detection

    "In today's trend security and authentication is big issue for that there are lot of application used for authentication and security purpose. Usually these devices are personal devices carried out by user. This paper gives the solution for authentication by using iris detection which is easier than retinal scanning, so...

    Provided By Creative Commons

  • White Papers // Feb 2015

    Enhanced Adaptive Routing with Transmission Success Probability in Wireless Mesh Networks

    "Wireless ad hoc networks are defenseless to uniqueness based assaults because they don't have the centralized server to control the communication nodes in the network, so many attacks like injecting the malicious nodes by adversaries, false identity creation for nodes and also including spoofing attacks, such that drastically collision or...

    Provided By Creative Commons

  • White Papers // Feb 2015

    Data Compression Techniques for Wireless Sensor Network

    Data compression is an art used to reduce the number of bits required to transmit the data of particular information. The goal of data compression is to eliminate the redundancy in a data in order to reduce its size. Data compression can either be lossless or lossy. Lossless data compression...

    Provided By Creative Commons

  • White Papers // Feb 2015

    e Store for Cloud Services

    "Cloud computing allows to access software and services over the network. The network servers and connections are collectively known as ""The cloud"". The way the cloud computing is designed that allows the user to access the similar way as super computer being accessed. User can acquire resources as they need...

    Provided By Creative Commons

  • White Papers // Feb 2015

    Evaluation of PCA and LDA Techniques for Face Recognition Using ORL Face Database

    "In this paper, the authors present a face recognition system that identifies a person from the input image given, for authentication purposes. As a feature extraction technique, Linear Discriminant Analysis (LDA) is used. After the generation of features, the classification is performed using Euclidean Distance classifier. Recognition rates are calculated...

    Provided By Creative Commons

  • White Papers // Feb 2015

    SPRAM: Selective Pheromone Removal Based Routing Algorithm for MANET's

    Performance of Mobile Ad-hoc NETwork (MANET) depends on routing. Suitable routing information needs appropriate and accurate packet delivery ratio with having less end-to-end delay. SPRAM is designed to deal with issues regarding routing in MANETs. SPRAM is a multipath Hybrid routing algorithm for MANETs that deal with Lack of plasticity...

    Provided By Creative Commons

  • White Papers // Feb 2015

    User Future Request Prediction

    The use of web technology has increased by a great extent in the recent times. Millions of users spend time surfing net to obtain information or for recreational activities. Along with satiating their own purpose, the users leave behind a detailed trail of all the web pages accessed and the...

    Provided By Creative Commons

  • White Papers // Feb 2015

    Security Mechanism in Alumni Portal

    "Innovation is a cognitive and creative activity. This innovation has continuously developed the web and its application. But along with this innovation, comes into presence the security factor. The threats that are present are ever-increasing and thwarting the growth of web. In this paper, the authors have considered the some...

    Provided By Creative Commons

  • White Papers // Feb 2015

    A Personalized Method for Blacklisting Users and Implementing Filtered Walls in OSN

    "OSNs (Online Social Networks) may also come under one of the platforms where the wide range of communication and sharing of information is taking place since last few years. But still there must be some privacy regarding the preferences of the user. As social networks are very flexible in sharing...

    Provided By Creative Commons

  • White Papers // Feb 2015

    Dynamic Server Provisioning Approach with Dynamic Content Application Server on Multitier Cluster over Heterogeneous Network

    "In real-time application on the internet requires reliability and Quality-of-Service (QoS) on the network, but when the network grows then it is difficult to maintain reliability and Quality-of-Service (QoS) just like the number of clients increases on the single tier cluster then the response time of server to client also...

    Provided By Creative Commons

  • White Papers // Feb 2015

    Best-Fit Wavelength Assignment Algorithm for Persistent Communication in Optical Networks

    "In this paper, the authors address traffic control enhancement in order to utilize bandwidth effectively in WDM based optical networks as well as the wavelength assignment problems and then develop an algorithm for both the problems. Traffics in WDM networks can be reduced based on the available free load, the...

    Provided By Creative Commons

  • White Papers // Feb 2015

    Analysis of Hybrid GPSR and Location Based Routing Protocol in VANET

    "VANET (Vehicular Ad-hoc NETwork) is an emerging new technology. VANET communication has recently become an increasingly popular research topic in the area of wireless networking. A VANET turns every participating vehicle into a wireless router or node allowing vehicles to connect and create a network. The primary goal is to...

    Provided By Creative Commons

  • White Papers // Feb 2015

    Analysis of Enhanced Request Response Detection Algorithm for Denial of Service Attack in VANET: A Review

    "Vehicular Ad-hoc NETworks (VANETs) are likely to be deployed in coming years and become the most relevant form of MANET. It is the special class of MANET i.e. mobile ad hoc networks .In recent years not much work has to be done on security. So VANET is used for life...

    Provided By Creative Commons

  • White Papers // Feb 2015

    Review of Neighbor Coverage Based Probabilistic Rebroadcast with Cryptographic Technique

    Mobile Ad-hoc NETworks (MANETs) consists of a collection of mobile nodes which can move freely. These nodes have characteristic that they can be dynamically self-organized into arbitrary topology networks without a fixed infrastructure. MANETs are highly dynamic network because nodes may join and leave the network at any time. NCPR...

    Provided By Creative Commons

  • White Papers // Feb 2015

    A Review on Byzantine Attack Detection and Prevention Using Game Theory

    MANET is the collection of various wireless mobile nodes. Security is of high concern in mobile ad hoc network as it has no centralized authority which can oversee the particular node working in the network. The attacks can be preformed from both inside and outside the network. Nodes within surrounding...

    Provided By Creative Commons

  • White Papers // Feb 2015

    Energy Efficiency Communication Protocol with Mobility in Wireless Sensor Network: A Survey

    "In wireless sensor network a sensor node collect data from cluster environment and send it to base station. The sensor nodes have limited computation capability, limited power and small memory size. In these network, sensor node are dependent on low energy. As per energy is a challenging issue in wireless...

    Provided By Creative Commons

  • White Papers // Feb 2015

    A Study on Intrusion Detection in Mobile Ad Hoc Networks

    "Intrusion detection for Mobile Ad-hoc NETwork (MANET) is a complex and difficult task due to the nature of the network. The mobile ad hoc network is vulnerable due to its features of open medium, cooperative algorithms, dynamic changing topology, lack of centralized monitoring and management point. The Mobile Ad-hoc NETworks...

    Provided By Creative Commons

  • White Papers // Feb 2015

    Speed Alert System for GPS-Enabled Smartphone's with Android Operating System

    With the rising penetration of Smartphone's in the growing market, mobile multimedia data content is becoming the dominant form of information that people produce and consume on a daily basis. In this paper, the authors present a application which collects speed and location information from the Global Positioning System (GPS),...

    Provided By Creative Commons

  • White Papers // Feb 2015

    A Survey on Techniques to Extract High-Quality Data From the Database

    Search data using queries on different type of databases like biomedical, web, domain specific databases, etc., often return a large number of results (hundreds and thousands), out of which only a small set of them are relevant to the user. By combing ranking and categorization search the data from the...

    Provided By Creative Commons

  • White Papers // Feb 2015

    A Proposal to Enhance A-KNN Clustering Method

    To maintain the quality of software and to better understand it, software architecture is decomposed. Software decomposition is done by various clustering methods. Each method provides different results of clustering on datasets. This paper presents the review of various clustering methods with A-KNN method in terms of efficiency and accuracy....

    Provided By Creative Commons

  • White Papers // Feb 2015

    A Review of Trust Model in Delay Tolerant Network

    Malicious and selfish behavior of node can cause serious threats in delay tolerant network. Thus designing a misbehavior scheme is a great challenge in DTN. The authors propose a trust model on the basis of packet drop level detection. The basic idea of trust model is introducing a periodically available...

    Provided By Creative Commons

  • White Papers // Feb 2015

    A Comparitive Study Of: Quality Assessment of Object Oriented Software at Design Level

    "In this paper, the authors approach a quality assessment tool which will achieve the quality parameter at the design level. Earlier, in every case, they check the quality after the completion of software means when software is coded and ready to use then they come to know that high quality...

    Provided By Creative Commons

  • White Papers // Feb 2015

    Efficient Storing Plus Retrieval of Big Data and Ultimate Filter From Attacks

    There are many data parallel computing frameworks such as MapReduce and Hadoop to run data intensive applications but they exhibit interest locality which only sweep part of a big data set. In this paper, the enhancing of this data grouping with Big data distributed database is done which uses index-based...

    Provided By Creative Commons

  • White Papers // Feb 2015

    QoS Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol

    Mobile Ad-hoc NETwork (MANET) is an infra-structure less and decentralized network which need a robust dynamic routing protocol. Most existing ad hoc routing protocols are and the broadcast nature of susceptible to node mobility, especially for large-scale networks. Such an efficient routing protocol is introduced called position based opportunistic routing...

    Provided By Creative Commons

  • White Papers // Feb 2015

    Hadoop Cluster on Linode Using Ambari for ImprovingTask Assignment Scheme Running in the Clouds

    "Currently, data-intensive problems are so prevailing that varied organizations in varied IT industries are facing in their business process. It's always critical for companies to process the potential of observing huge amount of information in an exceedingly smart and timely manner. MapReduce's code document implementation of Hadoop dramatically simplified the...

    Provided By Creative Commons

  • White Papers // Feb 2015

    Survey: Routing Protocols in Cognitive Radio Mesh Networks

    "Cognitive Radio (CR) is the upcoming and promising technology that solves the issue of spectrum allocation by allocating the required space to both primary and secondary users accordingly, without any interference by understanding the environment of the spectrum. In present scenario there is more demand for usage of wireless technology...

    Provided By Creative Commons

  • White Papers // Feb 2015

    Ant Colony Optimization Based Routing to Improve QoS in MANETs

    "A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes that dynamically self-organize to form an arbitrary and temporary network. The mobile nodes can communicate with each other without any fixed infrastructure. MANET can be set up quickly to facilitate communication in a hostile environment such as battlefield...

    Provided By Creative Commons

  • White Papers // Jun 2013

    Reliable Computing in Ad Hoc Networks

    Most of the existing techniques for network reliability evaluation are based on assumptions that all the nodes are perfect and the communication links are static and irreplaceable. However, these assumptions are not applicable for mobile ad hoc networks because of the rapid changes in connectivity and link characteristics due to...

    Provided By Creative Commons

  • White Papers // Jun 2013

    Congestion Avoidance by TCP

    Transport Control Protocol (TCP), the mostly used transport protocol, performs well over wired networks. TCP Congestion control plays the key role to ensure stability of the Internet along with fair and efficient allocation of the bandwidth. So, congestion control is currently a large area of research and concern in the...

    Provided By Creative Commons

  • White Papers // Jun 2013

    Comparison of Dynamic Routing Protocols: RIP and OSPF

    The two main classes of adaptive routing protocols in the internet: distance vector and link state. This paper presents the comparison between distance vector and link state. It also outlines the pros and cons of RIP and OSPF protocols and a performance analysis with some possible enhancement is presented. Network...

    Provided By Creative Commons

  • White Papers // Jun 2013

    Clone Attacks Detection in Wireless Sensor Networks

    The general problem in Wireless Sensor Network security (WSN) is the node Clone attack. This attack, is an adversary breaks into a sensor node. Once attacker captures sensor nodes, can compromise them and launch various types of attacks with those compromised nodes. Therefore, node capture attacks should be detected as...

    Provided By Creative Commons

  • White Papers // Jun 2013

    A Survey on Host to Host Congestion Control

    Congestion has been considered as one of the basic important issue in packet switched network. Congestion control refers to the mechanisms and techniques to control the congestion and keep the load below the capacity. In data networking and queuing theory, network congestion occurs when a link or node is carrying...

    Provided By Creative Commons

  • White Papers // Jun 2013

    Aligning IT With Business Objectives: A Critical Survival and Success Factor in Today's Business

    Alignment of IT with business objectives is a critically important topic in academic and industry. It is the key of success for modern organizations that is needed to survive and compete. It refers to the degree of congruence between business and IT strategies. This paper discusses the importance of aligning...

    Provided By Creative Commons

  • White Papers // Nov 2012

    Critical Success Tools for Research and Development Cycle at Indian SMEs-A Theoretical Framework

    This paper provides a review of literature for the identification of the Critical Success Tools (CSTs) for the development of R & D cycle at Indian SMEs. It proposed a theoretical framework in terms of R & D cycle for the instrument development and testing in future research. The findings...

    Provided By Creative Commons

  • White Papers // Oct 2012

    Strategic Technology Management: A Framework for Technology Analysis, Sustainable Innovation & Strategic Business Process Management at Indian SMEs

    This paper provides a review of literature for the understanding of the strategic technology management process with special reference to technology analysis, technology change management, strategy management, strategic Business Process Management (BPM) & sustainable innovation at Indian SMEs. It proposed a theoretical framework in terms of integrated strategic technology management...

    Provided By Creative Commons

  • White Papers // Jun 2012

    Database Services for Cloud Computing - An Overview

    Cloud computing has revolutionized the way computing infrastructure is abstracted and used. There is a proliferation of number of applications which leverage various cloud platforms, resulting in a tremendous increase in the scale of data generated as well as consumed by such applications. This paper reviews the features of Cloud...

    Provided By Creative Commons

  • White Papers // May 2013

    Cloud-Based Code Execution Framework for Scientific Problem Solving Environments

    In this paper, the authors present a novel Code Execution Framework that can execute code of different Problem Solving Environments (PSE), such as MATLAB, R and Octave, in parallel. In many e-Science domains different specialists are working together and need to share data or even execute calculations using programs created...

    Provided By Creative Commons

  • White Papers // Jul 2013

    Fair Benchmarking for Cloud Computing Systems

    The performance of Cloud systems is a key concern, but has typically been assessed by the comparison of relatively few Cloud systems, and often on the basis of just one or two features of performance. In this paper, the authors discuss the evaluation of four different Infrastructure as a Service...

    Provided By Creative Commons

  • White Papers // Mar 2013

    PEST- Benefit/Threat Analysis for Selection of ERP in Cloud for SMEs

    Enterprise Resource Planning (ERP) packages are used to integrate business processes of an organization through shared information flow. Majority of the large organizations within India have either implemented or are implementing ERP software. With the increasing market competition and globalization, Small and Medium sized Enterprise (SME) are keen to deploy...

    Provided By Creative Commons

  • White Papers // Aug 2012

    A Study on the Determinants of Growth for SMEs - With Reference to Servo Stabilizer Manufacturing Units

    Growth of small and medium enterprises is an essential element for any thriving economy. A study has been undertaken on typical business enterprises in India such as Servo Stabilizer manufacturing units to develop a better knowledge on the determinants of growth for small and medium enterprises. The main aim of...

    Provided By Creative Commons

  • White Papers // Apr 2013

    High Imperceptible Encoding for Computer Networks Security

    Today, computer and network technologies provide easy-to-use communication channels for steganography. In most algorithm used to secure information both steganography and cryptography are used together to secure a part of information. Steganography has many technical challenges such as high hiding capacity and imperceptibility. Digital Steganography exploits the use of a...

    Provided By Creative Commons

  • White Papers // Apr 2013

    Secured Searching of Valuable Data in a Metric Space Based on Similarity Measure

    The aim of the paper is collecting the similarity queries from various users and stored in the database. In this paper, the authors are mainly concentrating on privacy only. Here data owner, service provider, trusted clients are used. Here it is able to maintain data confidentiality with respect to untrusted...

    Provided By Creative Commons

  • White Papers // Apr 2013

    IP Trace Back Scheme for Packet Marking and Packet Logging Using RIHT

    Internet protocol trace back is the enabling technology to control the crime. Internet protocol packet is to find the real source of Internet attacks, the authors must possess the capability of discovering the origin of IP packets without relying on the source IP address field. This capability is called IP...

    Provided By Creative Commons

  • White Papers // Mar 2013

    Various Approaches for Detecting Attacks in Intrusion Detection System

    The rapid development of computer networks and more importantly internet has created many security problems such as ever growing new intrusions on computer network systems. To secure this system strong intrusion detection system has to be build. An intrusion detection system monitors all inbound and outbound network activity and identifies...

    Provided By Creative Commons

  • White Papers // Mar 2013

    Quality of Service Routing Protocol for Mobile Ad Hoc Network

    Ad-hoc wireless network is a part of wireless communication network. This network does not require any infrastructure. It is a distributed Routing network, and it supports for reusing of frequency dynamically. As ad-hoc network has different features, so it has to solve different issues as energy constraint, shared bandwidth and...

    Provided By Creative Commons

  • White Papers // Mar 2013

    Iris Recognition Using Fuzzy System

    In today's world the identification of every human being is very important. Security is more important for all of the users'. Biometric Systems are automated methods of verifying or recognizing the identity of a living person on the basis of some physiological characteristics like a fingerprint or iris pattern This...

    Provided By Creative Commons

  • White Papers // Mar 2013

    Signal Strength and System Operating Margin Estimation for Vehicular Ad-Hoc Networks in Rayleigh Fading Environment

    Vehicular Ad-hoc NETwork (VANET) is a subset of Mobile Ad-hoc NETwork (MANET). In VANET, vehicles act as transceiver and are able to send, receive and forward the information at the same time. In this paper, signal strength and System Operating Margin (SOM) are estimated for vehicular ad-hoc networks in absence...

    Provided By Creative Commons

  • White Papers // Mar 2013

    Mesh Technique for Nymble Architecture Sustaining - Secrecy and Security in Anonymizing Networks

    Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client's IP address from the server. The success of such networks, however, has been limited by users employing this secrecy for abusive purposes such as defacing popular websites. Website...

    Provided By Creative Commons

  • White Papers // Mar 2013

    Signature Free Virus Blocking Method to Detect Software Code Security

    The authors propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at various Internet services such as web service. Motivated by the observation that buffer overflow attacks typically contain executables whereas legitimate client requests never contain executables in most Internet services, SigFree blocks...

    Provided By Creative Commons

  • White Papers // Mar 2013

    Federated Network Security Administration Framework

    In today's world, Internet is now ubiquitous. Most of Applications are based on Internet. Web and Internet technologies are becoming critical to many enterprises, and their huge potential in facilitating communication, decision making, and better business processes makes security a major concern. The factor that most affects network security solutions...

    Provided By Creative Commons

  • White Papers // Mar 2013

    A Survey on Knowledge Based Classification of Different Routing Protocols in Delay Tolerant Networks

    Now-a-days, current wireless networks have provided a wide range of applications making it possible to successfully interconnect devices and systems, such as a mobile phone to a powerful server all around the world. Modern Internet protocols exhibits inefficient performance in those networks where the connectivity between end nodes has intermittent...

    Provided By Creative Commons

  • White Papers // Mar 2013

    Energy Conscious Dynamic Provisioning of Virtual Machines Using Adaptive Migration Thresholds in Cloud Data Center

    The fast growing demand for computational power utilized by modern applications with rapidly changing Cloud computing technology has directed to the foundation of large-scale virtualized data centers. Such data centers consume massive amounts of electrical energy resulting in high operating costs and carbon dioxide (CO2) emissions. Dynamic consolidation of Virtual...

    Provided By Creative Commons

  • White Papers // Mar 2013

    A Collaborative Selfish Replica With Watchdog and Pathrater in MANETS

    Mobile ad-hoc networks are autonomous and decentralized wireless systems. MANETs consist of mobile nodes that are free in moving in and out in the network. Nodes are the systems or devices i.e., mobile phone, laptop, personal digital assistance, MP3 player and personal computer that are participating in the network and...

    Provided By Creative Commons

  • White Papers // Mar 2013

    System Monitoring and Security Using Keylogger

    It is likely that about one out of many large companies systematically monitors the computer, internet, or email use of its users employees. There are over hundred's different products available today that will let organizations see what their users do at work on their "Personal" computers, in their email, and...

    Provided By Creative Commons

  • White Papers // Mar 2013

    Efficient Key Generation for Multimedia and Web Applications

    One of the main challenges for a secure multicast is access control, for making sure those only legitimate members of multicast group have access to the group communication. In the past two or three decades, cryptography has become the well-established means to solve the security problems in networking. However, there...

    Provided By Creative Commons

  • White Papers // May 2013

    An Efficient Approach to Improve Response Time in Multibiometric Patterns Retrieval From Large Database

    Biometric technologies are automated methods of verifying or recognizing the identity of a living person based on a physiological or behavioural characteristics. In a biometric identification system, the identity corresponding to the input data (probe/investigation) is typically determined by comparing it against the templates of all identities in a database...

    Provided By Creative Commons

  • White Papers // May 2013

    Safekeeping of Network Executive for a Domestic Internet Service Provider

    A net is one of the most important basic resources a large institution needs to have. Today, a network plays a very important role in every group. With extensive dispersed positioning, supervision the security of a network becomes very complex especially from the viewpoint of an ISP. ISP's are by...

    Provided By Creative Commons

  • White Papers // May 2013

    An Evaluation of Different Routing Schemes in DTN

    Delay Tolerant Networks (DTNs) have evolved from Mobile Ad Hoc NETworks (MANET). It is a network, where contemporaneous connectivity among all nodes doesn't exist. This leads to the problem of how to route a packet from one node to another, in such a network. This problem becomes more complex, when...

    Provided By Creative Commons

  • White Papers // May 2013

    Cloud Computing: A Revolution in Communication

    Now-a-days cloud computing is an emerging area and it replace grid computing. Cloud computing elaborate that how to utilize computer resources on network. In fact it is the market model that describes services provided over the internet. In Future, not all but most of the resources are controlled by cloud...

    Provided By Creative Commons

  • White Papers // May 2013

    Review Paper on Detection and Prevention Techniques of Gray-Hole Attack in Manet

    MANET is a kind of wireless ad hoc network. It is a self-configuring network of mobile routers connected by wireless links with no access point. Every mobile device in a network is autonomous. The mobile devices are free to move haphazardly and organize themselves arbitrarily. In other words, ad hoc...

    Provided By Creative Commons

  • White Papers // May 2013

    Monitoring Local Area Network Using Remote Method Invocation

    The aim of this paper, is to secure the network or a LAN by implementing such a software which is enable to carry out operations which are capable to monitor whole of the network, sitting on one chair by viewing remote desktop, passing messages to remote system and is also...

    Provided By Creative Commons

  • White Papers // May 2013

    A Novel Approach of Energy Optimization in WSN

    The wireless link can be unreliable in realistic Wireless Sensor Networks (WSNs). Energy efficient and reliable data forwarding is important because each node has limited resources. Therefore, the authors must suggest an optimal solution that considers using the information of the node's characteristic A wireless sensor network is composed of...

    Provided By Creative Commons

  • White Papers // May 2013

    Effective Identification of the Intruders and Modifiers in Wireless Sensor Networks

    Packet dropping and modification are common attacks that can be launched by an adversary to disrupt communication in wireless multi-hop sensor networks. Many schemes have been proposed to mitigate or tolerate such attacks, but very few can effectively and efficiently identify the intruders. To address this problem, the authors propose...

    Provided By Creative Commons

  • White Papers // May 2013

    Optimal Node Selection Using Broadcasting Algorithm in Mobile Adhoc Network

    In optimal node selection using broadcasting algorithm in mobile ad hoc network it finds the nearest optimal node for forwarding messages and the consequent optimal node for receiving and transferring messages and continues up to its destination node. Using 1-hop neighbour information, the sender-based broadcasting algorithm searches local optimal minimum...

    Provided By Creative Commons

  • White Papers // May 2013

    Detection of Malicious Url Redirection and Distribution

    Web-based malicious software (malware) has been increasing over the Internet. It poses threats to computer users through web sites. Computers are infected with Web-based malware by drive-by-download attacks. Drive-by-download attacks force users to download and install the Web-based malware without being aware of it. These attacks evade detection by using...

    Provided By Creative Commons

  • White Papers // May 2013

    Cloud on Linux Operating System

    The term "Cloud" is analyzed to "Internet". The term "Cloud computing" is based on cloud drawings used in the past to represent telephone networks and later to depict internet. Cloud computing is a internet based computing where virtual shared servers provide software, infrastructure, platform, devices and other resources and hosting...

    Provided By Creative Commons

  • White Papers // May 2013

    Hierarchical EAP Back-End Authenticator State Machine

    Authentication is a basic requirement for telecommunication network market for allowing resources to the legitimate users. Extended Authentication Protocol (EAP) is a widely used protocol for authentication. EAP is basically a framework which supports several authentication methods. The several authentication methods supported by a single protocol make this protocol a...

    Provided By Creative Commons