Engg Journals Publications

Displaying 1-40 of 503 results

  • White Papers // Apr 2014

    Framework for User Authenticity and Access Control Security over a Cloud

    Cloud computing has emerged as a computing paradigm bringing forward many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same trusted domain as data owners. Considering the user access control part, in recent years many...

    Provided By Engg Journals Publications

  • White Papers // Apr 2014

    Mining Recurrent Pattern Identification on Large Database

    Recurrent pattern mining is an important problem in the context of data mining. In this paper data mining algorithms have been discussed and compared. Recurrent pattern mining has been an important area in data mining research and it is the first step in the analysis of data rising in a...

    Provided By Engg Journals Publications

  • White Papers // Mar 2014

    An Ontology Framework For Context-Based Multilingual Document Retrieval

    In this paper the authors aim to present a multilingual ontology model for retrieving documents. This technique is based on context based multilingual translation. Though English is a common language in the world, at times there are situations where there is no chance in rural and remote places. For each...

    Provided By Engg Journals Publications

  • White Papers // Jan 2014

    Efficient Mining of Weighted Quantitative Association Rules and Characterization of Frequent Itemsets

    In recent years, a number of association rule mining algorithms were developed. In these algorithms, two important measures viz., support count and confidence were used to generate the frequent itemsets and the corresponding association rules in a market basket database. But in reality, these two measures are not sufficient for...

    Provided By Engg Journals Publications

  • White Papers // Jan 2014

    Approaches for Managing and Analyzing Unstructured Data

    Large volumes of data that will be stored and accessed in future are unstructured. The unstructured data is generated in a very fast pace and uses large storage areas. This increases the storage budget. Extracting value from this unstructured data which balances the budget is the most challenging task. Archives...

    Provided By Engg Journals Publications

  • White Papers // Dec 2013

    Cost Effective Cloud Environment Setup to Secure Corporate Data

    In recent years ad-hoc parallel processing has emerged to be one among the killer applications for Infrastructure-as-a-Service (IaaS) clouds. Major cloud computing firms have began to integrate frameworks for parallel processing in their product portfolio, creating it simple for purchasers to access these services and to deploy their programs. However,...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    EETSS: Energy Efficient Transitive Signature Scheme for Secure Group Communication in MANETs

    A secure group communication in mobile ad-hoc networks is challenging due to the mobility and limitations in computational and battery power of the nodes. This paper can be achieved by multicast routing protocol that ensures security through key management schemes. In this paper, the authors proposed an energy efficient multicast...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    An Analysis of Broadcast Authentication and Security Schemes in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are susceptible to various attacks as they are placed in hostile environments. Several security and authentication mechanisms are proposed for in terms of key exchange mechanisms, handshake protocols, and other routing protocols. The proposed triple key based broadcast authentication protocol is compared with the several other...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    A Secure and Decentralized Registration Scheme for IPv6 Network-Based Mobility

    For frequent movement of a mobile device, there is a need for a secure registration procedure of the mobile device by announcing its current location to the home network, especially, if it is not in the home domain. While devising the registration procedure for Mobile IPv6 (MIPv6) based network, it...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Conception of a Prototype to Validate a Maintenance Expert System

    Decision making is crucial for the life of many production plants. Good decision need the right information at the right time, and a deep knowledge of the system. This is especially true for older plants that are more prone to failures. Unfortunately, these systems are less rich of monitoring and...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    VLSI Implementation of Low Power High Speed ML MAP Processor Design for Dual Mode Binary Turbo Decoders

    This paper presents the Max Log Maximum a Posteriori (MAX Log MAP) architecture which influences maximum error correcting capacity and minimum hardware complexity. In Turbo decoding the design of Log MAP algorithm is complicated due to the exponential factor in the Log Likelihood Calculation. In this paper, a new architecture...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Node Attribute Behavior Based Intrusion Detection in Sensor Networks

    Security is one of the important problem in wireless sensor networks. With limited energy resources and processing resources, this paper focus on node attribute behavior based anomaly detection system and deals only with attributes of layered sensor node. It introduces node attribute behavioral index. The detection uses genetic algorithm which...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Kuder-Richardson Coefficient Based Trust Mechanism for Service Discovery in MANETs

    Service discovery in mobile ad-hoc networks is highly crucial due to the lack of centralized infrastructure. Furthermore, varieties of services available through the network may require different levels of security. Thus, a need arises for formulating and deploying an efficient trust oriented service discovery mechanism distributed in each and every...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Cloud Based Gateway Clustering of Cloud Data Retrieval with GCD Recovery Scheme

    Different parallelization approaches are available to cluster the computers and to scale the data and resources. With them, parallel clustering mechanism is used to faster the computation time of data access with minimal cost. But, this mechanism is not feasible for efficient data retrieve over cloud environment and is not...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Secure User Authentication Using Sclera in Quick Response Codes

    In this paper, an authentication method using sclera embedded in Quick Response (QR) codes is proposed. Quick response codes are two dimensional barcodes which can hold more data and can be fastly readable by personal computers and handheld devices like mobile phones, smart phones and tablet PCs. Biometrics though noted...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    A Methodological Survey on Load Balancing Techniques in Cloud Computing

    Cloud computing offers a variety of dynamic flexible resources to expedite the processing of large scale tasks in pay-by-use manner to public. In that, resource distribution and the effective load balancing among the available resources in heterogeneous environment is a major concern. Load balancing is employed across different data centers...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    Detection and Discrimination of DDoS Attacks from Flash Crowd Using Entropy Variations

    Internet is a worldwide network that combines millions local to global scope, private public, academics, business, optical network technologies, government networks. It carries an expandable range of information resources and services which lead to bulk exchange of traffic over the Internet every day. This excessive popularity creates some troubles in...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    Characterization and Modeling of Uncertainty Intended for a Secured MANET

    Mobile ad-hoc network is a chaos for decades due to its dynamic and heuristic base. It employs several forms of uncertainty such as vagueness and imprecision. Vagueness can be taken in terms of linguistic assumptions such as grading and classification for the acceptance. Imprecision on the other hand can be...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    An Efficient and Accurate Intrusion Detection System to Detect the Network Attack Groups Using the Layer Wise Individual Feature Set

    In the field of network security, intrusion is the severe threat for various networks. So an efficient Intrusion Detection System (IDS) is required to detect the intrusions that are spread through the Network. This paper is to reduce the average control path latency incurred between request and response of the...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    User Interest Level Based Preprocessing Algorithms Using Web Usage Mining

    Web logs take an important role to know about user behavior. Several pattern mining techniques were developed to understand the user behavior. A specific kind of preprocessing technique improves the quality and accuracy of the pattern mining algorithms. The existing algorithms have done the preprocessing activities for reducing the size...

    Provided By Engg Journals Publications

  • White Papers // Aug 2013

    A Novel Biometric System for Person Recognition Using Palm Vein Images

    The palm vein is one of the most reliable physiological characteristics that can be used to distinguish between individuals. In recent years, it receives more attention from the researchers. In this paper, the authors present a new approach for the personal identification using palm vein images. This paper attempts to...

    Provided By Engg Journals Publications

  • White Papers // Aug 2013

    Mining Weighted Association Rule Using FP - Tree

    The main goal of association rule mining is to examine large transaction databases which reveal implicit relationship among the data attributes. Classical association rule mining model assumes that all items have same significance without assigning their weight within a transaction or record. This paper proposed method gives importance for the...

    Provided By Engg Journals Publications

  • White Papers // Aug 2013

    Cloud Computing: Securing Client Data Storage

    Within cloud computing environment, vibrant useful resource part and reallocation tend to be important, helpful and ultimately promote capital investment returns. This paper covers method inside situation associated with distributed cloud environment, which can be viewed as techniques wherever program developers can share distributed resources with better security. This paper...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Reducing Communication Overhead for Authentication Using Self Contained Public Key Management Scheme in MANET

    In the past few years, the authors have seen a rapid increase in important application fields of Mobile Ad-hoc NETworks (MANET). Hence, many industrial and academic researchers have been conducted. Because, these applications are closely related to human beings and their physical environment, the usage of MANET on a large...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Minimization of System Resources for Cloud Based Application Using Web Browser Add On

    Evolution of cloud makes users to manage the data and applications online. It is the responsibility of the cloud service providers to care of data secure in terms of transferring and efficient by providing reliable performance. There are many challenges that are faced by the service providers to achieve the...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    An Efficient and Secure Intrusion Detection Method in Mobile Adhoc Network Using Intuitionistic Fuzzy

    Mobile ad-hoc network is a self organized wireless network which has a dynamic topology where nodes can be joining or leave the network at anytime with large number of nodes. Due to its infrastructure less, dynamic topology and lack of centralization it is vulnerable to many security attacks. In this...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Study and Constructing RDF Model for a Well Formatted Valid XML Document

    In recent years, semantic web is one of the technologies to make the WWW as machine understandable. The Resource Description Framework (RDF) proposed by W3C is used for describing metadata about (web) resources. The RDF data model can be represented as entity-relationship or class diagrams, as it are based upon...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Detection and Avoidance of SQL Injection Attack in Multi-Tier Web Based Application

    In this paper, the authors present SQL injection attack using stored procedure. In SQL injection attack, an attacker might deliver malicious SQL query segments as user input which could effect in a different database request. Using SQL injection attacks, an attacker might thus obtain and modify confidential information. An attacker...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    A Novel Approach for Software Implementation of Graphical Authentication Methodology

    The conventional method of authentication requires the user to remember a text based password which he enters in order to prove his legitimacy. Since security cannot be compromised, such passwords are usually lengthy and complicated else they would be cracked easily with various password hacking techniques. The user thus finds...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Detection & Classification of Internet Intrusion Based on the Combination of Random Forest and Naive Bayes

    The Use of internet renders a network packets susceptible to attacks ranging from passive eavesdropping to active impersonation, message replay and message distortion. There is no clear description as to what packets can be considered normal or abnormal. If the intrusions are not detected at the appropriate level, the loss...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Wireless Sensor Network - A Survey

    Wireless sensor networks are the networks consisting of large number of small and tiny sensor nodes. The nodes are supplied with limited power, memory and other resources and perform in-network processing. In this paper, various issues are discussed that actually put the limitations in the well working and the life...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Secure Tracking and Transport System Using RWP and GPS

    In the present era where technology has become a part of the people life, every day new applications are developed in every field to serve mankind. Many applications have been developed using GPS (Global Positioning System) such as aquatic and spacecraft routing, surveying and mapping, precise time reference etc. GPS...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Securing MANET From Blackhole and Wormhole Attacks

    Mobile ad-hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV (Ad-hoc On-demand Distance Vector routing protocol). Black hole...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    E-RIHT: Enhanced Hybrid IP Traceback Scheme With 16-Bit Marking Field

    Internet is a worldwide network and used in almost every field of work such as industrial, educational, military etc. Based on the use, its security needs differ. Few applications may need less security and few may need high security. Today various internet attacks are being developed every day, such as...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    An Efficeient Encrpytion Algorithm Based on Public Key Cryptography

    In asymmetric key cryptography, also known as Public Key cryptography. There are two different keys which are used that form a key pair. One key is used for encryption and the other is used for decryption, therefore, no other key can decrypt the message. The advantage of this scheme is...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Towards a Collaborative Learning Process Based on the Hybrid Cloud Computing and Web 2.0 Tools

    In this paper, the authors propose an online collaborative learning process composed of three iterative steps which mix the advantages of hybrid cloud computing, web 2.0 tools and the online questionnaire to improve the quality of the educational content of the course in the classroom. Indeed, it consists of transporting...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Elastic Calculator : A Mobile Application for Windows Mobile Using Mobile Cloud Services

    Cloud computing is highly significant in this era as it always shows a way to increase the capacity or to add an additional features on the go and also it is worthy to extend these services to mobile devices. It is proposed to design and implement elastic calculator for mobile...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Resource Provisioning Using Batch Mode Heuristic Priority with Round Robin Scheduling

    Million numbers of these users tries to access the data in different type of applications like online shopping etc., which tends to increase the load on a single server. Increase of load on a server results in reduction of throughput and it leads to a strong need of developing and...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Database Synchronization of Mobile-Build by Using Synchronization Framework

    In this paper, the authors propose synchronization of mobile database with server database using Microsoft synchronization framework. It is a platform for data synchronization developed by Microsoft which is used to synchronize multiple data stores. The sync framework lists the each item in a data store which was recognized by...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Mining on Car Database Employing Learning and Clustering Algorithms

    In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the known learning algorithms used are Naive Bayesian (NB) and SMO (Self-Minimal-Optimization). Thus the following two learning algorithms are used on a Car review database and thus...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    A Secure and Decentralized Registration Scheme for IPv6 Network-Based Mobility

    For frequent movement of a mobile device, there is a need for a secure registration procedure of the mobile device by announcing its current location to the home network, especially, if it is not in the home domain. While devising the registration procedure for Mobile IPv6 (MIPv6) based network, it...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Reducing Communication Overhead for Authentication Using Self Contained Public Key Management Scheme in MANET

    In the past few years, the authors have seen a rapid increase in important application fields of Mobile Ad-hoc NETworks (MANET). Hence, many industrial and academic researchers have been conducted. Because, these applications are closely related to human beings and their physical environment, the usage of MANET on a large...

    Provided By Engg Journals Publications

  • White Papers // Sep 2011

    Improving Security in Initial Network Entry Process of IEEE 802.16

    IEEE 802.16 basically designed to provide more security as compared to other wireless networks. It provides many security features to protect the information in the network as well as to protect the network from unauthorized access, still it vulnerable to many attacks. The process, where attack or threat is possible,...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Web Service Security Through Business Logic

    Service computing has recently gained significant momentum to enable the IT services and computing technology to perform business services more efficiently and effectively. Presently the service computing concentrates on inventing and establishing business models which leads to better QoS driven targeting services. So replacing existing business model by QoS driven...

    Provided By Engg Journals Publications

  • White Papers // Mar 2011

    Enhancing the Communication Channel Through Secure Shell and Irrational DES

    As the internet grows in popularity and therefore also in size more and more transmission takes place mainly because the technology is more readily available and applications have become more user friendly allowing entry to less sophisticated user over a broad spectrum. Most data transfer is mainly text based not...

    Provided By Engg Journals Publications

  • White Papers // Sep 2011

    SCARP: Secure Congestion Aware Routing Protocol for Wireless Sensor Networks

    Wireless sensor networks sense various kinds of information process them locally and communicate it to the outside world via satellite or Internet. In the near future, sensor networks will play a major role in collecting and disseminating information from the fields where ordinary networks are unreachable for various environmental and...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Personnel Security System Using Bluetooth Low Energy (BLE) Tag

    One of the primary aspects of personal security is through various user authentication techniques like biometrics, password, smart card, etc. The authors propose to design a personal security authentication system using the commonly available Bluetooth technology. The authentication is done on a fixed device, connected to the web and the...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Minimization of System Resources for Cloud Based Application Using Web Browser Add On

    Evolution of cloud makes users to manage the data and applications online. It is the responsibility of the cloud service providers to care of data secure in terms of transferring and efficient by providing reliable performance. There are many challenges that are faced by the service providers to achieve the...

    Provided By Engg Journals Publications

  • White Papers // May 2012

    A Comparative Survey on Symmetric Key Encryption Techniques

    Now-a-days, the use of internet are growing increasingly across the world, security becomes a prime concern of issue for the society. Earlier security was a major issue for military applications but now the area of applications has been enhanced since most of the communication takes place over the web. Cryptography...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    An Efficient and Secure Intrusion Detection Method in Mobile Adhoc Network Using Intuitionistic Fuzzy

    Mobile ad-hoc network is a self organized wireless network which has a dynamic topology where nodes can be joining or leave the network at anytime with large number of nodes. Due to its infrastructure less, dynamic topology and lack of centralization it is vulnerable to many security attacks. In this...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Secure Association Rule Mining for Distributed Level Hierarchy in Web

    Data mining technology can analyze massive data and it play very important role in many domains, if it used improperly it can also cause some new problem of information security. Thus several privacy preserving techniques for association rule mining have also been proposed in the past few years. Various algorithms...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Detection and Resolution of Deadlocks in Multi-Level Secure Databases

    The increase in the sharing of databases leads to the increase in the concurrency errors, which are termed as deadlocks. Many concurrency control techniques result in deadlocks, because these techniques require the transactions in the system to wait for one another. At this situation, an outside intervention is often required...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Effective Anonymous Imperceptible Secure Re-Active Routing (ISRR) Protocol for MANET

    In wireless networks, to provide the privacy protection is a hard one than wired networks. Many protocols in the network use the encryption and decryption technique to transfer the data in a secure way. In wired network, it doesn't need to consider the mobility of the node. But in wireless...

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    A Secure Scheme for Aggregating Encrypted Data Against Outsider Attacks in Wireless Sensor Networks

    Wireless sensor networks are low powered energy operated sensors mainly deployed in remote environments. Using methods to save energy is of utmost importance in these systems. Data transmission in such networks is by far the most energy consuming task and by reducing its contribution a great amount of energy can...

    Provided By Engg Journals Publications

  • White Papers // Aug 2010

    Efficient Secured Hash Based Password Authentication in Multiple Websites

    The most commercial web sites rely on a relatively weak form of password authentication, the browser simply sends a user's plaintext password to a remote web server, often using secure socket layer. Even when used over an encrypted connection, this form of password authentication is vulnerable to attack. In common...

    Provided By Engg Journals Publications

  • White Papers // Dec 2010

    Symmetric-Key Inter-Domain End-to-End Authentication Protocols for Mobile System

    The authors' goal is to propose and design a symmetric-key inter-domain end-to-end authentication protocols for a mobile system. They will be considering three mobile service domains; each has an authentication server. They denote by AS1, AS2 and AS3 corresponding authentication servers. For simplicity, let AS1, AS2, AS3 represent those three...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Proactive Network Security Approach for Multilayered Architecure

    In order to fulfill the organization goals and objectives, multilayered network architecture and various heterogeneous server environments are used. As the network architectures are complex, there is an increased demand in information security. So each organization needs to provide sufficient network security for the known and the unknown attacks according...

    Provided By Engg Journals Publications

  • White Papers // Dec 2010

    Authenticated Routing Protocol Based on Reputation System for Adhoc Networks

    Dynamic nature of ad-hoc networks leads to challenges in securing the network. Due to vulnerable nature of ad-hoc networks there are many security threats. Much work is going on to provide security to the network. One of the solution to the problem is ARAN - authenticated routing protocol which is...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Secure User Authentication Using Sclera in Quick Response Codes

    In this paper, an authentication method using sclera embedded in Quick Response (QR) codes is proposed. Quick response codes are two dimensional barcodes which can hold more data and can be fastly readable by personal computers and handheld devices like mobile phones, smart phones and tablet PCs. Biometrics though noted...

    Provided By Engg Journals Publications

  • White Papers // Aug 2010

    Effective Comparison and Evaluation of DES and Rijndael Algorithm (AES)

    In this paper, the authors discuss the effective coding of Rijndael algorithm, Advanced Encryption Standard (AES) in hardware description language, verilog. In this paper, they analyze the structure and design of new AES, following three criteria: resistance against all known attacks; speed and code compactness on a wide range of...

    Provided By Engg Journals Publications

  • White Papers // Aug 2010

    Performance of Multi Server Authentication and Key Agreement with User Protection in Network Security

    For obtaining permitted services by service providers in a network environment, the user must legally login to the provider's server. Using smart cards, remote user authentication and key agreement can be simplified, flexible, and efficient for creating a secure distributed computers environment. Addition to user authentication and key distribution, it...

    Provided By Engg Journals Publications

  • White Papers // Sep 2010

    Generation of Key for Session Key Distribution Using Bio-Metrics

    Biometric cryptosystem gives different methods in high secure applications. Cryptography is intended to ensure the secrecy and authenticity of message. Here, the authors will consider symmetric key cryptography. For conventional encryption to work, the two parties must share a common key. Frequent key changes are desirable to limit the amount...

    Provided By Engg Journals Publications

  • White Papers // Nov 2010

    Multimodal Biometrics Based Authentication Against Dictionary Attacks

    The multimodal biometric based user authentication systems are highly secured and efficient to use and place total trust on the authentication server where biometric verification data are stored in a central database. Such systems are, prone to dictionary attacks initiated at the server side. In this paper, the authors propose...

    Provided By Engg Journals Publications

  • White Papers // Nov 2010

    Strong Password Based EAP-TLS Authentication Protocol for WiMAX

    Security becomes more important in wireless network due to lack of physical boundary. Worldwide interoperability for microwave access is a wireless communications technology, also known as IEEE802.16 that is intended for wireless \"Metropolitan area network\". IEEE802.16e (WiMAX amendment) is a standard for mobile application in WiMAX. IEEE 802.16e supports EAP...

    Provided By Engg Journals Publications

  • White Papers // Jul 2012

    Dorsal Hand Vein Biometry by Independent Component Analysis

    Biometric authentication provides a high security and reliable approach to be used in security access system. Personal identification based on hand vein patterns is a newly developed recent year. The pattern of blood veins in the hand is unique to every individual, even among identical twins, and it do not...

    Provided By Engg Journals Publications

  • White Papers // Oct 2011

    Detection of Threats in Honeynet Using Honeywall

    Information is a strategic resource and to protect this kind of confidential and private data against possible attacks, the people must take into account some security mechanisms and measures. And as computer network are subject to electronic attacks. This led to growing interest in more aggressive forms of defense to...

    Provided By Engg Journals Publications

  • White Papers // Oct 2010

    An Implementation Approach for Intrusion Detection System in Wireless Sensor Network

    A wireless sensor network is a network of simple sensing devices; which are capable of sensing some changes of incidents/parameters and communicating with other devices, over a specific geographic area for some specific purposes like target tracking, surveillance, environmental monitoring etc. The Intrusion Detection System (IDS) has become a critical...

    Provided By Engg Journals Publications

  • White Papers // May 2010

    Implementation of Secured Password for Web Applications Using Two Server Model

    The secured password is the most commonly used authentication mechanism in security applications. There may be chances of password hacking from the hackers, so that it is very essential to protect password information while sending request to the servers. Early web application used central database as the password authentication scheme....

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Enhancing Accountability for Distributed Data Sharing in the Cloud

    In cloud computing environment resources are shared among various clients and it's important for system provider to allocate the necessary resources for the clients. As the sizes of IT infrastructure continue to grow, cloud computing is a new way of virtualization technologies that enable management of virtual machines over a...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    An Efficient and Accurate Intrusion Detection System to Detect the Network Attack Groups Using the Layer Wise Individual Feature Set

    In the field of network security, intrusion is the severe threat for various networks. So an efficient Intrusion Detection System (IDS) is required to detect the intrusions that are spread through the Network. This paper is to reduce the average control path latency incurred between request and response of the...

    Provided By Engg Journals Publications

  • White Papers // Jun 2010

    A New Technique to Backup and Restore DBMS Using XML and .NET Technologies

    In this paper, the authors proposed a new technique for backing up and restoring different DataBase Management Systems (DBMS). The technique is enabling to backup and restore a part of or the whole database using a unified interface using ASP.NET and XML technologies. It presents a web solution allowing the...

    Provided By Engg Journals Publications

  • White Papers // Sep 2011

    Evaluation of Intrusion Detection Algorithms for Interoperability Gateways in Ad Hoc Networks

    Security issues in MANET are of primary importance due to its higher vulnerability to attacks compared to wired networks. Though attack prevention mechanisms using authentication and encryption become the first line of defense, newer types of attacks cannot be detected by such systems. A second line of defense is necessary...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Measuring the Effectiveness and Efficiency of Rule Reordering Algorithm for Policy Conflict

    Network security has acquired appreciable attention among business communities. Firewall act as a frontier defense and plays a significant role for establishing secure communication in networks against unauthorized traffic occurred in network. Firewall policies deployed in firewall, directs the firewalls to handle network traffic for particular IP addresses and protocols....

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    E-RIHT: Enhanced Hybrid IP Traceback Scheme With 16-Bit Marking Field

    Internet is a worldwide network and used in almost every field of work such as industrial, educational, military etc. Based on the use, its security needs differ. Few applications may need less security and few may need high security. Today various internet attacks are being developed every day, such as...

    Provided By Engg Journals Publications

  • White Papers // Oct 2010

    Comparative Study of Various PKINIT Methods Used in Advanced Kerberos

    Traditional authentication method is password, but it cannot resist dictionary and playback attack. Thus, applications, which send an unencrypted password over the network, are extremely vulnerable. Kerberos can be used as a solution to these network security problems. The Kerberos protocol with public key cryptography may help client to prove...

    Provided By Engg Journals Publications

  • White Papers // May 2010

    A Hybrid System for Fingerprint Identification

    Fingerprint-based identification is one of the core methodologies for person identification. It remains a reliable, efficient and commonly accepted biometric. The most popular and extensively used method for fingerprint identification; the minutiae based, show poor performance for real time authentication. However, the performance of minutiae based approaches can be boosted...

    Provided By Engg Journals Publications

  • White Papers // Aug 2011

    Virtual Energy-Efficient Encryption and Keying (VEEEK) for Wireless Sensor Networks

    The sensor nodes are resource-limited wireless devices; therefore the designing of protocols for WSNs (Wireless Sensor Networks) which are cost-efficient and secure is a major challenging problem in today's networking and mobile computing area. The communication cost is the most important factor in the sensor's energy consumption; here the authors...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    An Efficeient Encrpytion Algorithm Based on Public Key Cryptography

    In asymmetric key cryptography, also known as Public Key cryptography. There are two different keys which are used that form a key pair. One key is used for encryption and the other is used for decryption, therefore, no other key can decrypt the message. The advantage of this scheme is...

    Provided By Engg Journals Publications

  • White Papers // Sep 2010

    Fuzzy K-Mean Clustering Via Random Forest for Intrusiion Detection System

    Due to continuous growth of the internet technology, there is needed to establish security mechanism. So for achieving this objective various NIDS has been proposed. Data mining is one of the most effective techniques used for intrusion detection. This paper evaluates the performance of unsupervised learning techniques over benchmark intrusion...

    Provided By Engg Journals Publications

  • White Papers // Dec 2013

    Cost Effective Cloud Environment Setup to Secure Corporate Data

    In recent years ad-hoc parallel processing has emerged to be one among the killer applications for Infrastructure-as-a-Service (IaaS) clouds. Major cloud computing firms have began to integrate frameworks for parallel processing in their product portfolio, creating it simple for purchasers to access these services and to deploy their programs. However,...

    Provided By Engg Journals Publications