Engg Journals Publications

Displaying 1-40 of 500 results

  • White Papers // Jan 2014

    Efficient Mining of Weighted Quantitative Association Rules and Characterization of Frequent Itemsets

    In recent years, a number of association rule mining algorithms were developed. In these algorithms, two important measures viz., support count and confidence were used to generate the frequent itemsets and the corresponding association rules in a market basket database. But in reality, these two measures are not sufficient for...

    Provided By Engg Journals Publications

  • White Papers // Jan 2014

    Approaches for Managing and Analyzing Unstructured Data

    Large volumes of data that will be stored and accessed in future are unstructured. The unstructured data is generated in a very fast pace and uses large storage areas. This increases the storage budget. Extracting value from this unstructured data which balances the budget is the most challenging task. Archives...

    Provided By Engg Journals Publications

  • White Papers // Dec 2013

    Cost Effective Cloud Environment Setup to Secure Corporate Data

    In recent years ad-hoc parallel processing has emerged to be one among the killer applications for Infrastructure-as-a-Service (IaaS) clouds. Major cloud computing firms have began to integrate frameworks for parallel processing in their product portfolio, creating it simple for purchasers to access these services and to deploy their programs. However,...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    EETSS: Energy Efficient Transitive Signature Scheme for Secure Group Communication in MANETs

    A secure group communication in mobile ad-hoc networks is challenging due to the mobility and limitations in computational and battery power of the nodes. This paper can be achieved by multicast routing protocol that ensures security through key management schemes. In this paper, the authors proposed an energy efficient multicast...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    An Analysis of Broadcast Authentication and Security Schemes in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are susceptible to various attacks as they are placed in hostile environments. Several security and authentication mechanisms are proposed for in terms of key exchange mechanisms, handshake protocols, and other routing protocols. The proposed triple key based broadcast authentication protocol is compared with the several other...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    A Secure and Decentralized Registration Scheme for IPv6 Network-Based Mobility

    For frequent movement of a mobile device, there is a need for a secure registration procedure of the mobile device by announcing its current location to the home network, especially, if it is not in the home domain. While devising the registration procedure for Mobile IPv6 (MIPv6) based network, it...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Conception of a Prototype to Validate a Maintenance Expert System

    Decision making is crucial for the life of many production plants. Good decision need the right information at the right time, and a deep knowledge of the system. This is especially true for older plants that are more prone to failures. Unfortunately, these systems are less rich of monitoring and...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    VLSI Implementation of Low Power High Speed ML MAP Processor Design for Dual Mode Binary Turbo Decoders

    This paper presents the Max Log Maximum a Posteriori (MAX Log MAP) architecture which influences maximum error correcting capacity and minimum hardware complexity. In Turbo decoding the design of Log MAP algorithm is complicated due to the exponential factor in the Log Likelihood Calculation. In this paper, a new architecture...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Secure User Authentication Using Sclera in Quick Response Codes

    In this paper, an authentication method using sclera embedded in Quick Response (QR) codes is proposed. Quick response codes are two dimensional barcodes which can hold more data and can be fastly readable by personal computers and handheld devices like mobile phones, smart phones and tablet PCs. Biometrics though noted...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Node Attribute Behavior Based Intrusion Detection in Sensor Networks

    Security is one of the important problem in wireless sensor networks. With limited energy resources and processing resources, this paper focus on node attribute behavior based anomaly detection system and deals only with attributes of layered sensor node. It introduces node attribute behavioral index. The detection uses genetic algorithm which...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Kuder-Richardson Coefficient Based Trust Mechanism for Service Discovery in MANETs

    Service discovery in mobile ad-hoc networks is highly crucial due to the lack of centralized infrastructure. Furthermore, varieties of services available through the network may require different levels of security. Thus, a need arises for formulating and deploying an efficient trust oriented service discovery mechanism distributed in each and every...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    A Methodological Survey on Load Balancing Techniques in Cloud Computing

    Cloud computing offers a variety of dynamic flexible resources to expedite the processing of large scale tasks in pay-by-use manner to public. In that, resource distribution and the effective load balancing among the available resources in heterogeneous environment is a major concern. Load balancing is employed across different data centers...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Cloud Based Gateway Clustering of Cloud Data Retrieval with GCD Recovery Scheme

    Different parallelization approaches are available to cluster the computers and to scale the data and resources. With them, parallel clustering mechanism is used to faster the computation time of data access with minimal cost. But, this mechanism is not feasible for efficient data retrieve over cloud environment and is not...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    An Efficient and Accurate Intrusion Detection System to Detect the Network Attack Groups Using the Layer Wise Individual Feature Set

    In the field of network security, intrusion is the severe threat for various networks. So an efficient Intrusion Detection System (IDS) is required to detect the intrusions that are spread through the Network. This paper is to reduce the average control path latency incurred between request and response of the...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    Detection and Discrimination of DDoS Attacks from Flash Crowd Using Entropy Variations

    Internet is a worldwide network that combines millions local to global scope, private public, academics, business, optical network technologies, government networks. It carries an expandable range of information resources and services which lead to bulk exchange of traffic over the Internet every day. This excessive popularity creates some troubles in...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    Characterization and Modeling of Uncertainty Intended for a Secured MANET

    Mobile ad-hoc network is a chaos for decades due to its dynamic and heuristic base. It employs several forms of uncertainty such as vagueness and imprecision. Vagueness can be taken in terms of linguistic assumptions such as grading and classification for the acceptance. Imprecision on the other hand can be...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    User Interest Level Based Preprocessing Algorithms Using Web Usage Mining

    Web logs take an important role to know about user behavior. Several pattern mining techniques were developed to understand the user behavior. A specific kind of preprocessing technique improves the quality and accuracy of the pattern mining algorithms. The existing algorithms have done the preprocessing activities for reducing the size...

    Provided By Engg Journals Publications

  • White Papers // Aug 2013

    Cloud Computing: Securing Client Data Storage

    Within cloud computing environment, vibrant useful resource part and reallocation tend to be important, helpful and ultimately promote capital investment returns. This paper covers method inside situation associated with distributed cloud environment, which can be viewed as techniques wherever program developers can share distributed resources with better security. This paper...

    Provided By Engg Journals Publications

  • White Papers // Aug 2013

    A Novel Biometric System for Person Recognition Using Palm Vein Images

    The palm vein is one of the most reliable physiological characteristics that can be used to distinguish between individuals. In recent years, it receives more attention from the researchers. In this paper, the authors present a new approach for the personal identification using palm vein images. This paper attempts to...

    Provided By Engg Journals Publications

  • White Papers // Aug 2013

    Mining Weighted Association Rule Using FP - Tree

    The main goal of association rule mining is to examine large transaction databases which reveal implicit relationship among the data attributes. Classical association rule mining model assumes that all items have same significance without assigning their weight within a transaction or record. This paper proposed method gives importance for the...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Android Mobile Security with Auto boot Application

    In this paper, the authors handle to create the application for android mobile to find a lost mobile. Once installed their application in the mobile, its starts to get the latitude and longitude value of the mobile by using the inbuilt GPS in mobile. The mobile moves from one place...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    An Efficient and Light Weight Secure Framework for Applications of Cloud Environment Using Identity Encryption Method

    Security plays a vital role in cloud computing Services. Public key encryption is the mostly used method to provide security that needs sharing the public keys and digital certificates. Securing the data and resources in the cloud is a difficult task. If the security method adopted in cloud environment is...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Knowledge Based Security Using DRM

    To take precautionary secures to the software is combat work. The analysis of avoiding the unauthorized access to the software will be done by the knowledge based security using Digital Rights Management (DRM). DRM is a standard code. The DRM will embed with source code which will protect from piracy....

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Minimization of System Resources for Cloud Based Application Using Web Browser Add On

    Evolution of cloud makes users to manage the data and applications online. It is the responsibility of the cloud service providers to care of data secure in terms of transferring and efficient by providing reliable performance. There are many challenges that are faced by the service providers to achieve the...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    An Efficient and Secure Intrusion Detection Method in Mobile Adhoc Network Using Intuitionistic Fuzzy

    Mobile ad-hoc network is a self organized wireless network which has a dynamic topology where nodes can be joining or leave the network at anytime with large number of nodes. Due to its infrastructure less, dynamic topology and lack of centralization it is vulnerable to many security attacks. In this...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Detection and Resolution of Deadlocks in Multi-Level Secure Databases

    The increase in the sharing of databases leads to the increase in the concurrency errors, which are termed as deadlocks. Many concurrency control techniques result in deadlocks, because these techniques require the transactions in the system to wait for one another. At this situation, an outside intervention is often required...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Effective Anonymous Imperceptible Secure Re-Active Routing (ISRR) Protocol for MANET

    In wireless networks, to provide the privacy protection is a hard one than wired networks. Many protocols in the network use the encryption and decryption technique to transfer the data in a secure way. In wired network, it doesn't need to consider the mobility of the node. But in wireless...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Reducing Communication Overhead for Authentication Using Self Contained Public Key Management Scheme in MANET

    In the past few years, the authors have seen a rapid increase in important application fields of Mobile Ad-hoc NETworks (MANET). Hence, many industrial and academic researchers have been conducted. Because, these applications are closely related to human beings and their physical environment, the usage of MANET on a large...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    A New Business Model for ATM Transaction Security Using Fingerprint Recognition

    Money transactions play a vital role in the nature of trade. Today, ATMs and Credit cards are used for this purpose, the authentication of these transactions are unsecure. To overcome this shortcoming of piracy in money transactions, the author proposes the idea of using fingerprints of customers as password in...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Study and Constructing RDF Model for a Well Formatted Valid XML Document

    In recent years, semantic web is one of the technologies to make the WWW as machine understandable. The Resource Description Framework (RDF) proposed by W3C is used for describing metadata about (web) resources. The RDF data model can be represented as entity-relationship or class diagrams, as it are based upon...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Proactive Network Security Approach for Multilayered Architecure

    In order to fulfill the organization goals and objectives, multilayered network architecture and various heterogeneous server environments are used. As the network architectures are complex, there is an increased demand in information security. So each organization needs to provide sufficient network security for the known and the unknown attacks according...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Enhancing Accountability for Distributed Data Sharing in the Cloud

    In cloud computing environment resources are shared among various clients and it's important for system provider to allocate the necessary resources for the clients. As the sizes of IT infrastructure continue to grow, cloud computing is a new way of virtualization technologies that enable management of virtual machines over a...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    E-RIHT: Enhanced Hybrid IP Traceback Scheme With 16-Bit Marking Field

    Internet is a worldwide network and used in almost every field of work such as industrial, educational, military etc. Based on the use, its security needs differ. Few applications may need less security and few may need high security. Today various internet attacks are being developed every day, such as...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Detection & Classification of Internet Intrusion Based on the Combination of Random Forest and Naive Bayes

    The Use of internet renders a network packets susceptible to attacks ranging from passive eavesdropping to active impersonation, message replay and message distortion. There is no clear description as to what packets can be considered normal or abnormal. If the intrusions are not detected at the appropriate level, the loss...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Wireless Sensor Network - A Survey

    Wireless sensor networks are the networks consisting of large number of small and tiny sensor nodes. The nodes are supplied with limited power, memory and other resources and perform in-network processing. In this paper, various issues are discussed that actually put the limitations in the well working and the life...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Secure Tracking and Transport System Using RWP and GPS

    In the present era where technology has become a part of the people life, every day new applications are developed in every field to serve mankind. Many applications have been developed using GPS (Global Positioning System) such as aquatic and spacecraft routing, surveying and mapping, precise time reference etc. GPS...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Database Synchronization of Mobile-Build by Using Synchronization Framework

    In this paper, the authors propose synchronization of mobile database with server database using Microsoft synchronization framework. It is a platform for data synchronization developed by Microsoft which is used to synchronize multiple data stores. The sync framework lists the each item in a data store which was recognized by...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Mining on Car Database Employing Learning and Clustering Algorithms

    In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the known learning algorithms used are Naive Bayesian (NB) and SMO (Self-Minimal-Optimization). Thus the following two learning algorithms are used on a Car review database and thus...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    An Efficeient Encrpytion Algorithm Based on Public Key Cryptography

    In asymmetric key cryptography, also known as Public Key cryptography. There are two different keys which are used that form a key pair. One key is used for encryption and the other is used for decryption, therefore, no other key can decrypt the message. The advantage of this scheme is...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    RFID in Cloud Environment for Attendance Monitoring System

    RFID, primitively used for automatic identification and tracking has now been extensively used for remote storage and retrieval of the data. RFID is similar to barcode but are far more efficient, easy to manufacture, and can be used in environments hostile to barcodes. RFID comprises of a tag; usually sequestered...

    Provided By Engg Journals Publications

  • White Papers // Apr 2013

    Analyzing the Critical Issues of Mobile Users in Cloud Computing

    Cloud computing has recently emerged as a new paradigm for hosting and delivering services over the Internet. Mobile Cloud Computing is widely accepted as a concept that can significantly improve the user experience when accessing mobile services. By removing the limitations of mobile devices with respect to storage and computing...

    Provided By Engg Journals Publications

  • White Papers // Apr 2013

    WSLA Schema for Functionality Based Weight Fixing of Non-Functional Parameters of Web Services

    Recently web services have evolved as a cost-effective solution for exchanging information between distributed applications over different operating system, platform, and software environment. The success of such a system is mainly depends on the quality offered by the service and the extent to which the web service meets the customer...

    Provided By Engg Journals Publications

  • White Papers // Mar 2013

    Data Confidentiality and Loss Prevention using Virtual Private Database

    As organizations increase their adoption of database systems as the key data management technology for day-to-day operations and decision making, the security of data managed by these systems becomes crucial. Database systems become more vulnerable to security breaches even as they gain productivity and efficiency advantages. Thus data loss prevention...

    Provided By Engg Journals Publications

  • White Papers // Mar 2013

    GSM Based Smart Street Light Monitoring and Control System

    A Street light, lamppost, street lamp, light standard, or lamp standard is a raised source of light on the edge of a road or walkway, which is turned on or lit at a certain time every night. Major advantages of street lighting includes: prevention of accidents and increase in safety....

    Provided By Engg Journals Publications

  • White Papers // Mar 2013

    Integral System for Automation of Education Board and IT Association using Cloud and Mobilink.

    Most of the educational boards and IT associates still use traditional and inefficient intellectual E-administration system for communicating with their valued clients. The clients may include the students in case of educational boards, employees considering the IT associates. Datasets that grows so large that they become awkward to work with...

    Provided By Engg Journals Publications

  • White Papers // Mar 2013

    JAX-WS Web Service for Transferring Image

    Using web Services, it is possible to send any type of information in any form of encryption. In this paper, different techniques have been used to attach binary files in SOAP messages. Web services provide communication between different platforms by using standardized SOAP message protocols. Hence, it is often productive...

    Provided By Engg Journals Publications

  • White Papers // Feb 2013

    A Modified Leader Election Algorithm for MANET

    Distributed systems are the backbone of modern day computing services. A Mobile Ad-hoc NETwork (MANET) is a collection of mobile nodes that can communicate via message passing over wireless links. Communication takes place directly between nodes which are in transmission range of each other else communication is done through message...

    Provided By Engg Journals Publications

  • White Papers // Feb 2013

    QoS- Unbroken Traffic Lane Streaming in Road Network

    At present situation travel becomes the biggest hassle for everyone. In this proposed research paper, the author has used GPS system to find out the shortest path to make users travel at ease. Through this navigation process it is clear-cut for user to find out right path. In this process,...

    Provided By Engg Journals Publications

  • White Papers // Feb 2013

    A Service Oriented Architecture to Integrate Short Message Service (SMS) Notification in Road Traffic Volume Control System

    The traffic volume becomes one of the top problems in the world, the volume of traffic spends many time and much money, the traffic volume grows daily, and there is not effective and suitable solutions for grows problem. This paper will present and describe an effective approach to integrate the...

    Provided By Engg Journals Publications

  • White Papers // Jan 2013

    A New Approach for Designing Cryptographic Systems based on Feistel Structure

    Many classical and modern cryptographic algorithms have been developed by the cryptographers to facilitate data security operations. Classical ciphers are not being widely used because of limited key space. Public key cryptosystems are effective compare to symmetric systems but are slower than symmetric ciphers. Feistel Cipher structure is the reference...

    Provided By Engg Journals Publications

  • White Papers // Jun 2013

    Efficient Use of Available Network in Mobile for Executing Mobile Application With Real Time Constraints

    In today's world mobile fulfill most of computational needs of average persons in form of different applications. As smart phones works in multiprocessing mode, no of applications gets executed simultaneously executed in mobile device. Though mobile configurations are improving in (battery, processing speed) it still needs additional computing speed to...

    Provided By Engg Journals Publications

  • White Papers // Jun 2013

    Advance Technique for Online Payment Security in E-Commerce : "Double Verification"

    In E-Commerce various parties involve in E-Payment for buying and selling purpose of goods/services. An Internet E-Commerce Payment Gateway is a critical component for online transaction and that should provide trust to customer that transaction is secure and reliable in all security aspect. There are various vulnerabilities in the present...

    Provided By Engg Journals Publications

  • White Papers // Feb 2013

    Performance Evaluation of Mutation / Non-Mutation Based Classification With Missing Data

    A common problem encountered by many data mining techniques is the missing data. A missing data is defined as an attribute or feature in a dataset which has no associated data value. Correct treatment of these data is crucial, as they have a negative impact on the interpretation and result...

    Provided By Engg Journals Publications

  • White Papers // Feb 2013

    Performance Evaluation of Density-Based Outlier Detection on High Dimensional Data

    Outlier detection is a task that finds objects that are considerably dissimilar, exceptional or inconsistent with respect to the remaining data. Outlier detection has wide applications which include data analysis, financial fraud detection, network intrusion detection and clinical diagnosis of diseases. In data analysis applications, outliers are often considered as...

    Provided By Engg Journals Publications

  • White Papers // Jan 2013

    Architecture Design of a Virtualized Embedded System

    Now-a-days, embedded systems have become a major driver of technological developments particularly in the industrial sector. In an embedded system, the hardware and software components are so intertwined that evolution is often a big issue. Thanks to the contributions of virtualization it is possible to design more flexible and scalable...

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    Efficient Storage Reduction of Frequency of Items in Vertical Data Layout

    The digital databases are immersed with large amount of data. The explosive growth of massive amounts of data leads to space complexity, performance degradation, scalability and time complexity. The authors cannot stop the incoming data, but they can fix some limitations to reduce the massive collection of data. The crux...

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    Semantic Inference Model for Database Inference Detection Violation

    Database Security has become a major problem in modern day's applications. Generally for Information security everybody tries to protect sensitive data by using different security techniques. Despite these security measures, a malicious user can access non-sensitive information and can infer sensitive data from it. The authors hereby investigate a semantic...

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    Classification and Evaluation the Privacy Preserving Data Mining Techniques by Using a Data Modification - Based Framework

    In recent years, the data mining techniques have met a serious challenge due to the increased concerning and worries of the privacy that is, protecting the privacy of the critical and sensitive data. Different techniques and algorithms have been already presented for Privacy Preserving data mining, which could be classified...

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    A Permutation Gigantic Issues in Mobile Real Time Distributed Database : Consistency & Security

    Several shape of Information System are broadly used in a variety of System Models. With the rapid development of computer network, Information System users concern more about data sharing in networks. In conventional relational database, data consistency was controlled by consistency control mechanism when a data object is locked in...

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    A Study on Scheduling in Grid Environment

    Grid computing is a high performance computing environment that allows sharing of geographically distributed resources across multiple administrative domains and used to solve large scale computational demands. In the grid environment, users can access the resources transparently without knowing where they are physically located. To achieve the promising potentials of...

    Provided By Engg Journals Publications

  • White Papers // Jul 2010

    Data Security : An Analysis

    There is intense of cyber attach through electronic media, so it calls for data security practice. Internet technology becomes very pervasive to exchange data through online. Various government and private sectors mostly depends on information technology and facing problem of security breach. The precious thing on internet is the data....

    Provided By Engg Journals Publications

  • White Papers // Jul 2010

    Efficient and Secure Information Sharing for Security Personnels: A Role and Cooperation Based Approach

    To facilitate users to interact with and share information without difficulty and faultlessly across various networks and databases nationwide, a secure and trusted information-sharing environment has been recognized as an imperative requirement and to advance homeland security effort. The key incentive following this paper is to build a secure and...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Android Mobile Security with Auto boot Application

    In this paper, the authors handle to create the application for android mobile to find a lost mobile. Once installed their application in the mobile, its starts to get the latitude and longitude value of the mobile by using the inbuilt GPS in mobile. The mobile moves from one place...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    An Efficient and Light Weight Secure Framework for Applications of Cloud Environment Using Identity Encryption Method

    Security plays a vital role in cloud computing Services. Public key encryption is the mostly used method to provide security that needs sharing the public keys and digital certificates. Securing the data and resources in the cloud is a difficult task. If the security method adopted in cloud environment is...

    Provided By Engg Journals Publications

  • White Papers // Sep 2010

    Elliptic Curve Cryptography Enabled Security for Wireless Communication

    Neal koblitz and victor miller independently proposed Elliptic Curve Cryptography (ECC). This is an efficient technique, which provides security for wireless communication. Earlier, the authors were using Wired Equivalent Privacy (WEP) protocol and Rivest-Shamir-Adleman (RSA) scheme, which largely stimulated the research and development of security protocols for wireless communication. The...

    Provided By Engg Journals Publications

  • White Papers // Aug 2010

    A New Approach to Secure Data Aggregation Protocol for Wireless Sensor Network

    In this paper, the authors have proposed a secure data aggregation protocol for Wireless Sensor Networks (WSNs) that is robust to deceitful nodes. The goal of this protocol is to guarantee the essential security needs (like source authentication, data confidentiality & data integrity) as well as to achieve low communication...

    Provided By Engg Journals Publications

  • White Papers // Nov 2009

    A Glance at Secure Multiparty Computation for Privacy Preserving Data Mining

    In this paper, the authors provide an overview of the new and rapidly emerging research area of Secure Multiparty Computation (SMC). They also propose several existing as well as new SMC problems along with some solutions. It provides detailed overview of work done so far in this area and a...

    Provided By Engg Journals Publications

  • White Papers // Sep 2010

    Security Enhancement of Forward Digital Signatures Using ECC

    In this paper, the authors propose a technique to enhance the security of forward digital signature. In this enhancement scheme the private key and the public key changes at random intervals of time, if there is a communication between two users. If there is no communication then the keys will...

    Provided By Engg Journals Publications

  • White Papers // Mar 2010

    Security Enhancement Using Mutual Authentication in Existing CDMA Systems

    Even though CDMA2000 wireless networks are being widely deployed as a cellular digital standard around the world, it has some hidden vulnerabilities concerned with security issues. The existing CDMA systems use authentication mechanism by CAVE (Cellular Authentication and Voice Encryption) algorithm. This authentication method has several disadvantages. Only one way...

    Provided By Engg Journals Publications

  • White Papers // Aug 2010

    A View on Secure Routing in Adhoc Networks

    An ad-hoc network is a collection of mobile nodes forming a temporary network without any additional infrastructure and no centralized control. Some of the applications of ad-hoc networks are disaster management during earthquakes, military applications, students in a class room sharing information and floods etc. In this paper, the authors...

    Provided By Engg Journals Publications

  • White Papers // Jan 2011

    Encryption Using XOR Based Extended Key for Information Security - A Novel Approach

    The explosive growth of information, places a high demand for information security. Information security deals with securing the information from unauthorized access or misuse of information either intentionally or accidentally. Information may be represented in many forms like text, documents, audio, video, images or maps. The standard and widely used...

    Provided By Engg Journals Publications

  • White Papers // Sep 2011

    Enhanced Security in Secure Socket Layer 3.0 Specification

    The Secure Sockets Layer (SSL) was originally developed by Netscape in order to secure http communications. Version 3.0 of SSL was released in 1995. It is what the authors think of when they say SSL Slight variation became Transport Layer Security (TLS) and was accepted by the IETF. They address...

    Provided By Engg Journals Publications

  • White Papers // Nov 2010

    Web Services Security Architectures Composition and Contract Design Using RBAC

    Service oriented architecture's web services authorization traditionally is done using common access control models like role-based access control. In thinking of a composite application that stitches together the capabilities of multiple services, any action in the composite app should ideally check the access control rules of all constituent services before...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Knowledge Based Security Using DRM

    To take precautionary secures to the software is combat work. The analysis of avoiding the unauthorized access to the software will be done by the knowledge based security using Digital Rights Management (DRM). DRM is a standard code. The DRM will embed with source code which will protect from piracy....

    Provided By Engg Journals Publications

  • White Papers // Aug 2010

    CCMP-AES Model with DSR Routing Protocol to Secure Link Layer and Network Layer in Mobile Adhoc Networks

    Mobile ad-hoc network is a special kind of wireless networks. It is a collection of mobile nodes without having aid of established infrastructure. Mobile ad-hoc network are vulnerable to attacks compared to wired networks due to limited physical security, volatile network topologies, power-constrained operations, intrinsic requirement of mutual trust among...

    Provided By Engg Journals Publications

  • White Papers // May 2010

    Protection of Public Network Communication by Using Internet Protocol Security

    In this paper, the authors deal with the issue of the protection of public network communications by using IPSec implementation in Linux kernel. Complete description of custom cipher algorithm Implementation method is given. This paper also contains experiment description with results. In the existing literature there are numerous designs based...

    Provided By Engg Journals Publications

  • White Papers // Oct 2010

    Two Factor Biometric Key for Secure Wireless Networks

    The applications of wireless networks are steadily increasing throughout the world. Wireless transactions are now happening in highly secure banking networks. To have more reliable networks, security of wireless networks is to be strengthened. Various encryption algorithms are employed for this purpose. With standard key size and format, they are...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    EETSS: Energy Efficient Transitive Signature Scheme for Secure Group Communication in MANETs

    A secure group communication in mobile ad-hoc networks is challenging due to the mobility and limitations in computational and battery power of the nodes. This paper can be achieved by multicast routing protocol that ensures security through key management schemes. In this paper, the authors proposed an energy efficient multicast...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    An Analysis of Broadcast Authentication and Security Schemes in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are susceptible to various attacks as they are placed in hostile environments. Several security and authentication mechanisms are proposed for in terms of key exchange mechanisms, handshake protocols, and other routing protocols. The proposed triple key based broadcast authentication protocol is compared with the several other...

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    Infrastructural Map for Information Security

    Threat modeling is an iterative process that encompasses various stages of software development and continues throughout its life cycle. The threat modeling process starts with the phases of identifying critical assets, creating an architecture overview, and decomposing to identify possible points of attack. Data flow diagrams and sequence diagrams are...

    Provided By Engg Journals Publications