Dhirubhai Ambani Institute of Information and Communication Technology

Displaying 1-4 of 4 results

  • White Papers // Sep 2013

    Quorum Sensing for Regenerating Codes in Distributed Storage

    Distributed storage systems with replication are well known for storing large amount of data. A large number of replication is done in order to provide reliability. This makes the system expensive. Various methods have been proposed over time to reduce the degree of replication and yet provide same level of...

    Provided By Dhirubhai Ambani Institute of Information and Communication Technology

  • White Papers // Dec 2010

    A Logic Programming Approach for Formal Verification of NetBill Security and Transactions Protocol

    Use of formal techniques for verifying the security features of electronic commerce protocols would facilitate, the enhancement of reliability of such protocols, thereby increasing their usability. This paper projects the application of logic programming techniques for formal verification of a well referred security and transactions protocol, the Net Bill. The...

    Provided By Dhirubhai Ambani Institute of Information and Communication Technology

  • White Papers // Dec 2009

    Performance Analysis of Zone Routing Protocols in Ad Hoc Networks

    In Mobile Ad Hoc NETworks (MANETs), routing is a challenging task due to node mobility, traffic and network size. It is very important to analyze the scalability characteristics of the routing protocols with respect to these parameters. Zone Routing Protocol (ZRP) is considered to be one of the most scalable...

    Provided By Dhirubhai Ambani Institute of Information and Communication Technology

  • White Papers // Feb 2008

    On the Security of \"An Efficient and Complete Remote User Authentication Scheme\"

    The authors have shown the security weaknesses of the Liaw et al.'s scheme. The design of the Liaw et al.'s scheme is so weak that anyone can login to the remote system by just intercepting a valid login message. Recently, Liaw et al. proposed a remote user authentication scheme using...

    Provided By Dhirubhai Ambani Institute of Information and Communication Technology

  • White Papers // Dec 2009

    Performance Analysis of Zone Routing Protocols in Ad Hoc Networks

    In Mobile Ad Hoc NETworks (MANETs), routing is a challenging task due to node mobility, traffic and network size. It is very important to analyze the scalability characteristics of the routing protocols with respect to these parameters. Zone Routing Protocol (ZRP) is considered to be one of the most scalable...

    Provided By Dhirubhai Ambani Institute of Information and Communication Technology

  • White Papers // Dec 2010

    A Logic Programming Approach for Formal Verification of NetBill Security and Transactions Protocol

    Use of formal techniques for verifying the security features of electronic commerce protocols would facilitate, the enhancement of reliability of such protocols, thereby increasing their usability. This paper projects the application of logic programming techniques for formal verification of a well referred security and transactions protocol, the Net Bill. The...

    Provided By Dhirubhai Ambani Institute of Information and Communication Technology

  • White Papers // Sep 2013

    Quorum Sensing for Regenerating Codes in Distributed Storage

    Distributed storage systems with replication are well known for storing large amount of data. A large number of replication is done in order to provide reliability. This makes the system expensive. Various methods have been proposed over time to reduce the degree of replication and yet provide same level of...

    Provided By Dhirubhai Ambani Institute of Information and Communication Technology

  • White Papers // Feb 2008

    On the Security of \"An Efficient and Complete Remote User Authentication Scheme\"

    The authors have shown the security weaknesses of the Liaw et al.'s scheme. The design of the Liaw et al.'s scheme is so weak that anyone can login to the remote system by just intercepting a valid login message. Recently, Liaw et al. proposed a remote user authentication scheme using...

    Provided By Dhirubhai Ambani Institute of Information and Communication Technology