Global Journals

Displaying 1-40 of 145 results

  • White Papers // Feb 2014

    Performance Analysis of Secure Integrated Circuits using Blowfish Algorithm

    Security is an essential feature of Information Communication Technology (ICT). Information has to be encrypted at the transmitter side to maintain secrecy and decrypted at the receiver side to retrieve the original information for secure data transmission over insecure computer data communication networks. This paper analyzes the performance metrics of...

    Provided By Global Journals

  • White Papers // Feb 2014

    A Performance Comparison Between Enlightenment and Emulation in Microsoft Hyper-V

    Microsoft (MS) Hyper-V is a native hypervisor that enables platform virtualization on x86-64 systems. It is a micro-kernelized hypervisor where a host operating system provides the drivers for the hardware. This approach leverages MS Hyper-V to support enlightenments (the Microsoft name for Paravirtualization) in addition to the hardware emulation virtualization...

    Provided By Global Journals

  • White Papers // Jan 2014

    Behavior based access Control & Encryption (BBACE) Security Model as a Service in Cloud Platform

    Cloud computing is a new flexible approach for providing higher computational power in shared medium. It provides the distributed model based on self evaluating techniques to improve the processing capabilities of the system with lesser managerial concerns. It is made up of client, application, platform, servers and infrastructures. This computing...

    Provided By Global Journals

  • White Papers // Jan 2014

    TPA Ensuring Data Integrity in Cloud Environment

    Cloud computing is an internet based computing where virtual shared servers provide software, infrastructure, platform and other resources to customers on a pay-as-you-use basis. In one of the services offered by cloud viz. Storage-as-a-Service (SaaS), users outsource their data to cloud without having direct possession or control on it. Storage...

    Provided By Global Journals

  • White Papers // Jan 2014

    Security Provisioning in Cloud Environments using Dynamic Expiration Enabled Role based Access Control Model

    In cloud environment the Role Based Access Control (RBAC) system model has come up with certain promising facilities for security communities. This system has established itself as highly robust, powerful and generalized framework for providing access control for security management. There are numerous practical applications and circumstances where the users...

    Provided By Global Journals

  • White Papers // Dec 2013

    Efficient use of Mobile Agents for Network Security & Management

    Mobile agents are composition of computer software and data which migrates from one computer to another. While doing this, they continue their itinerary up to the home computer. Mobile agents have special characteristics which can help intrusion detection in several ways. The use of mobile codes and mobile agent based...

    Provided By Global Journals

  • White Papers // Dec 2013

    A Study of Encryption Algorithms AES, DES and RSA for Security

    In recent years network security has become an important issue. Encryption has come up as a solution, and plays an important role in information security system. Many techniques are needed to protect the shared data. This paper focus on cryptography to secure the data while transmitting in the network. Firstly...

    Provided By Global Journals

  • White Papers // Nov 2013

    Safeguarding the Liabilities of Data Accessing in Cloud Computing

    Cloud computing is the process of providing the virtualized services over the internet. The space in the web commonly known as cloud has been monitored by service provider. In a real time scenario, a user registers for a particular service and shares the user data as well as access credential...

    Provided By Global Journals

  • White Papers // Nov 2013

    Single Process Architecture for E-Learning Over Cloud Computing

    A cloud is a type of parallel and distributed system consisting of a collection of interconnected and virtualized computers that are dynamically provisioned and presented as one or more unified computing resources based on service-level agreements established through negotiation between the service provider and consumers. Cloud computing refers to both...

    Provided By Global Journals

  • White Papers // Nov 2013

    Implementing Cloud Data Security by Encryption using Rijndael Algorithm

    Cloud computing emerges as a new computing paradigm which aims to provide reliable, customized and QoS guaranteed dynamic computing environments for end-users. However, adopting a cloud computing paradigm may have positive as well as negative effects on the data security of service consumers. In a cloud computing environment, data and...

    Provided By Global Journals

  • White Papers // Nov 2013

    Challenge Token based Security for Hybrid Clouds

    Cloud has now become the essential part of the web technology and fast growth of cloud computing technique making it worth for the companies to invest in cloud. Growth of number of clouds is requiring inter cloud communication as concept of multi cloud or hybrid cloud is also spreading quickly....

    Provided By Global Journals

  • White Papers // Nov 2013

    Trend and Need of Application Virtualization in Cloud Computing

    As the variety of applications increases so does the complexity of delivering and managing those applications also increases, many organizations tried to manage that complexity by standardizing on a fixed portfolio of applications in a locked-down configuration. This approach reduces the IT labour costs, but the restrictions involved lead to...

    Provided By Global Journals

  • White Papers // Oct 2013

    An Efficient Security Mechanisms for Different Sort of Attacks in CWSN

    One of the major important aspects of Wireless Sensor Networks (WSNs) is their capability to collect and process huge amounts of information in parallel with the help of small, power limited devices enabling their use in observation, target detection and various other monitoring applications. Recently, new ideas have been proposed...

    Provided By Global Journals

  • White Papers // Sep 2013

    FPR a Secure and Secured Biometric in Web Banking-Survey

    Today, attributable to the vulnerability of normal authentication system, crime has accumulated among the past few years. Identity authentication in web banking depends on biometric feature like face, iris, voice, hand mathematics, handwriting, retina; fingerprints can significantly decrease the fraud. In order that they unit being replaced by biometric authentication...

    Provided By Global Journals

  • White Papers // Aug 2013

    A Novel Technique for Cancelable and Irrevocable Biometric Template Generation for Fingerprints

    Cancelable biometric key generation is vital in biometric systems to protect sensitive information of users. A novel technique called Reciprocated Magnitude and Complex Conjugate-Phase (RMCCP) transform is proposed. This proposed method comprises of different components for the development of new method. It is tested with the multiple aspects such as...

    Provided By Global Journals

  • White Papers // Jul 2013

    Monitoring Data Integrity while using TPA in Cloud Environment

    Cloud Computing is the arising technology that delivers software, platform and infrastructure as a service over a network. Cloud minimizes the burden of users by allowing them to remotely store their data and eliminates the need of local storage and maintenance. Even though benefits are higher but while storing data...

    Provided By Global Journals

  • White Papers // Jul 2013

    Secure Cloud Architecture for Preserving Privacy in Cloud Computing using OTP/WTP

    Cloud computing is an On-demand self-service Internet infrastructure where a customer can pay and use only what is needed, managed by an API. The SP plays an active role in transmitting information across the cloud. The main objective of the proposed architecture is preserving the privacy of the information ensuring...

    Provided By Global Journals

  • White Papers // Jul 2013

    Cloud Data Security using Authentication and Encryption Technique

    Cloud Computing has been envisioned as the next generation architecture of IT Enterprise. In cloud computing application software and databases are moving to the centralized large data centers. This mechanism brings about many new challenges, which have not been well understood. Security and privacy concerns, however, are among the top...

    Provided By Global Journals

  • White Papers // Jul 2013

    Designing Parametric Constraint Based Power Aware Scheduling System in a Virtualized Cloud Environment

    The increasing rate of the demand for computational resources has led to the production of large scale data-centers. They consume huge amounts of electrical power resulting in high operational costs and carbon dioxide emissions. Power-related costs have become one of the major economic factors in IT data-centers, and companies and...

    Provided By Global Journals

  • White Papers // Jul 2013

    Privacy Management of Multi User Environment in Online Social Networks (OSNs)

    Online Social Networks (OSNs) are inherently designed to enable people to share personal and public information and make social connections with others. These OSNs provides digital social interactions and social as well as personal information sharing, but in sharing a number of security and privacy problems raised. While OSNs allow...

    Provided By Global Journals

  • White Papers // Jul 2013

    Time Stamp Based Cross Layer MANET Security Protocol

    Mobile Ad-hoc NETwork (MANET) is a wireless network where nodes communicate through other nodes without the aid of a base station. Security is a major challenge in MANET as the packets are prone vulnerability and eavesdropping in wireless environment. Generally MAC layer provides the security in such wireless network through...

    Provided By Global Journals

  • White Papers // Jun 2013

    Design and Implementation of Mobility for Virtual Private Network Users

    Virtual Private Network framework provides Confidentiality, Integrity, Availability, Authentication and Anti-Replay services to the packets travelling through the shared medium like Internet. With the latest Advancement in the technology, Internet is available to the users thru all means like Wireless networks, GPRS, Satellite. When the VPN user roams or switches...

    Provided By Global Journals

  • White Papers // Jun 2013

    An Efficient Secure Message Transmission in Mobile Ad Hoc Networks Using Enhanced Homomorphic Encryption Scheme

    In MANETs the nodes are capable of roaming independently. The node with inadequate physical protection can be easily captured, compromised and hijacked. Due to this huge dependency's on the nodes, there are more security problems. Therefore the nodes in the network must be prepared to work in a mode that...

    Provided By Global Journals

  • White Papers // Jun 2013

    E-Learning Improved Architecture for Clouds

    E-Learning is spreading around the world with leaps and bounds with the growth of Internet. People are keen to get high skilled knowledge from the knowledge pros in the industry and a very new concept of cloud computing is also not unaffected with E-learning. With the intense penetration of the...

    Provided By Global Journals

  • White Papers // Jun 2013

    Security in Hybrid Cloud

    As the cloud computing is spreading around the world, need of inter cloud communication is becoming a growing in the organizations. It is causing the researchers to focus on first, making it possible to communicate between two or more clouds and second security of communication is to considered up to...

    Provided By Global Journals

  • White Papers // Jun 2013

    Secured Localized Broadcasting in Wireless Ad-Hoc Networks

    Broadcasting, one of the fundamental operations of the wireless ad-hoc networks, can be implemented using two approaches i.e. static and dynamic. In broadcasting a node disseminates a message to all other nodes within the network. Usually in static approach the forwarding or non-forwarding status of the node is determined by...

    Provided By Global Journals

  • White Papers // Jun 2013

    A Framework for Cross-Platform E-Commerce Website Development for Multiple Devices and Browsers

    In this paper, the authors has to identify Human-Computer Interaction (HCI) design methods and techniques for the development of cross-platform e-commerce websites that can be used on multiple devices with different screen sizes and web browsers. The findings presented here are based on a theoretical framework consisting of three categorizations:...

    Provided By Global Journals

  • White Papers // Jun 2013

    Cooperative Caching Framework for Mobile Cloud Computing

    Due to the advancement in mobile devices and wireless networks mobile cloud computing, which combines mobile computing and cloud computing has gained momentum since 2009. The characteristics of mobile devices and wireless network makes the implementation of mobile cloud computing more complicated than for fixed clouds. This section lists some...

    Provided By Global Journals

  • White Papers // Jun 2013

    Database Autopsy Close Look to Database Auditing for Oracle Database

    Today, that business has different rules and regulation and supplied threats; organizations must go well beyond securing their data, and managing their database. Essentially, data have to be perpetually monitored to be aware of who what, to all their data. Database auditing involves monitoring database to be aware of what...

    Provided By Global Journals

  • White Papers // May 2013

    A Review of NTLM Rainbow Table Generation Techniques

    Rainbow tables reduce the difficulty in brute force cracking a single password by creating a large pre-generated data set of hashes from nearly every possible password Rainbow Tables. This method, known as the Faster Time-Memory Trade-off Technique, is based on research by Martin Hellman & Ronald Rivest done in the...

    Provided By Global Journals

  • White Papers // May 2013

    CAPTCHA: Attacks and Weaknesses Against OCR Technology

    The basic challenge in designing these obfuscating CAPTCHAs is to make them easy enough that users are not dissuaded from attempting a solution, yet still too difficult to solve using available computer vision algorithms. As Modern technology grows this gap however becomes thinner and thinner. It is possible to enhance...

    Provided By Global Journals

  • White Papers // May 2013

    Face Recognition Using Local Binary Patterns (LBP)

    The face of a human being conveys a lot of information about identity and emotional state of the person. Face recognition is an interesting and challenging problem, and impacts important applications in many areas such as identification for law enforcement, authentication for banking and security system access, and personal identification...

    Provided By Global Journals

  • White Papers // May 2013

    Robust Automatic Face Recognition

    The crux of the character identification problem is to exploit the relations between videos and the associated texts in order to label the faces of characters with names. It has similarities to identifying faces in news videos. However, in news videos, candidate names for the faces are available from the...

    Provided By Global Journals

  • White Papers // May 2013

    Application Deployment Models with Load Balancing Mechanisms using Service Level Agreement Scheduling in Cloud Computing

    Cloud computing is a market-oriented computing paradigm with virtually unlimited scalable high performance computing resources. The High level middleware services for cloud computing and cloud workflow systems are research frontier for both cloud computing and workflow technologies. In this paper, the extension of Cloud management infrastructure with Service Level Agreement...

    Provided By Global Journals

  • White Papers // May 2013

    Efficient Spam Classification by Appropriate Feature Selection

    Spam is a key problem in electronic communication, including large-scale email systems and the growing number of blogs. Currently a lot of research work is performed on automatic detection of spam emails using classification techniques such as SVM, NB, MLP, KNN, ID3, J48, Random Tree, etc. For spam dataset it...

    Provided By Global Journals

  • White Papers // May 2013

    Cloud Data Storage Services Considering Public Audit for Security

    The cloud computing is a computing technology that allows the user to share the pool of configurable sources where the data of individuals or the organizations can be stored remotely those can be accessible on-demand high quality applications. Even though there are many advantages associated with cloud computing still it...

    Provided By Global Journals

  • White Papers // May 2013

    Survey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm

    Cloud computing is an amazing technology where users can remotely store their data into the cloud to enjoy high quality application and services. Cloud being the most vulnerable next generation architecture consist of two major design elements i.e. the Cloud Service Provider(CSP) and the Client. Even though the cloud computing...

    Provided By Global Journals

  • White Papers // May 2013

    Close to Real-Time Suggestion of File-Stage Mutations From Virtual Disk Marks

    The authors describe a new mechanism for cloud computing enabling close to real-time monitoring of virtual Disk Mark streams across an entire cloud. Their solution has low IO overhead for the guest VM, low latency to File-Stage mutation notification, and a layered design for scalability. They achieve low IO overhead...

    Provided By Global Journals

  • White Papers // May 2013

    Force of Movable Multimedia Function on Information Core Consolidation

    The convergence of Movable computing and cloud computing enables new multimedia Function that is both resource intensive and interaction-intensive. For these Function, end-to-end network bandwidth and latency matter greatly when cloud resources are used to augment the computational power and battery life of a Movable device. The authors first present...

    Provided By Global Journals

  • White Papers // May 2013

    Survey on Efficient Audit Service to Ensure Data Integrity in Cloud Environment

    Cloud computing is an internet based computing which provides different users an opportunity to store their data in the cloud. While data outsourcing relieves the owner of the burden of the local data storage and maintenance but as they have no longer physical possession of outsourced data makes data integrity...

    Provided By Global Journals

  • White Papers // May 2013

    CAPTCHA: Attacks and Weaknesses Against OCR Technology

    The basic challenge in designing these obfuscating CAPTCHAs is to make them easy enough that users are not dissuaded from attempting a solution, yet still too difficult to solve using available computer vision algorithms. As Modern technology grows this gap however becomes thinner and thinner. It is possible to enhance...

    Provided By Global Journals

  • White Papers // Jul 2012

    Preprocessing Technique for Face Recognition Applications Under Varying Illumination Conditions

    In the last years, face recognition has become a popular area of research in computer vision, it is typically used in network security systems and access control systems but it is also useful in other multimedia information processing areas. Performance of the face verification system depends on many conditions. One...

    Provided By Global Journals

  • White Papers // Jul 2011

    Research Issues in Cloud Computing

    Cloud computing moved away from personal computers and the individual enterprise application server to services provided by the cloud of computers. The emergence of cloud computing has made a tremendous impact on the Information Technology (IT) industry over the past few years. Currently IT industry needs Cloud computing services to...

    Provided By Global Journals

  • White Papers // Apr 2012

    Heterogeneous Tree Based Authenticated Group Key Transfer Protocol

    Message passing from one source to another has become a key for many upcoming technologies. This is already achieved by introduction of topics of keys, authentications etc. Secret key transfer is being done presently by using mutually trusted Key Generation centre (KGS). By this selection of session key by which...

    Provided By Global Journals

  • White Papers // Jun 2013

    Secured Localized Broadcasting in Wireless Ad-Hoc Networks

    Broadcasting, one of the fundamental operations of the wireless ad-hoc networks, can be implemented using two approaches i.e. static and dynamic. In broadcasting a node disseminates a message to all other nodes within the network. Usually in static approach the forwarding or non-forwarding status of the node is determined by...

    Provided By Global Journals

  • White Papers // Dec 2010

    Truth of D-DoS Attacks in MANET

    Network security is a weak link in wired and wireless network systems. Malicious attacks have caused tremendous loss by impairing the functionalities of the computer networks. Denial of Service (DoS) and Distributed DoS (DDoS) attacks are two of the most harmful threats to the network functionality. Mobile Ad-hoc NETworks (MANET)...

    Provided By Global Journals

  • White Papers // Aug 2013

    A Novel Technique for Cancelable and Irrevocable Biometric Template Generation for Fingerprints

    Cancelable biometric key generation is vital in biometric systems to protect sensitive information of users. A novel technique called Reciprocated Magnitude and Complex Conjugate-Phase (RMCCP) transform is proposed. This proposed method comprises of different components for the development of new method. It is tested with the multiple aspects such as...

    Provided By Global Journals

  • White Papers // Jun 2012

    An Architectural Metrics Scorecard Based Approach to Intrusion Detection System Evaluation for Wireless Network

    Wireless IDS architectural metrics are used to compare the intended scope, architecture of wireless IDS, and how they match the deployment architecture. These metrics can be used to evaluate the architectural efficiency of a wireless IDS and can help in designing efficient wireless IDS. Wireless IDS analyze wireless specific traffic...

    Provided By Global Journals

  • White Papers // Jul 2010

    Multi-Layer User Authentication Approach For Electronic Business Using Biometrics

    With the increased awareness of the dangers of cyber-terrorism and identity fraud, the security of information systems has been propelled to the forefront as organizations strive to implement greater access control. Access control for information systems is founded upon reliable user authentication, and the predominant form of authentication remains the...

    Provided By Global Journals

  • White Papers // Sep 2010

    An Algorithm To Reduce The Size Of Cipher Text

    Globalization has increased the degree of connectivity of communication networks. Organizations are spending a huge amount for securing their data and information. The rising competition in the global market has increased the threats to access the sensitive data. Whether data is at rest or mobile data, it is the need...

    Provided By Global Journals

  • White Papers // Jan 2010

    A Comparative Study on Fingerprint Protection Using Watermarking Techniques

    Protection of biometric data is gaining interest and digital watermarking techniques are used to protect the biometric data from either accidental or intentional attacks. Among the various biometrics, fingerprints are more famous in the authentication area, as they are unique to each person and are mainly used for the establishment...

    Provided By Global Journals

  • White Papers // Jul 2013

    Monitoring Data Integrity while using TPA in Cloud Environment

    Cloud Computing is the arising technology that delivers software, platform and infrastructure as a service over a network. Cloud minimizes the burden of users by allowing them to remotely store their data and eliminates the need of local storage and maintenance. Even though benefits are higher but while storing data...

    Provided By Global Journals

  • White Papers // May 2013

    Face Recognition Using Local Binary Patterns (LBP)

    The face of a human being conveys a lot of information about identity and emotional state of the person. Face recognition is an interesting and challenging problem, and impacts important applications in many areas such as identification for law enforcement, authentication for banking and security system access, and personal identification...

    Provided By Global Journals

  • White Papers // Jul 2010

    Applying Software Metrics on Web Applications

    Web Applications Automates many daily business activities. User Interact with these web applications by the interface which these applications provides. Web applications are different from normal applications. The traditional software metrics can be applied to web applications. But some new metrics which are made only for web applications are important...

    Provided By Global Journals

  • White Papers // Nov 2011

    Efficient HMAC Based Message Authentication System for Mobile Environment

    Computationally constrained environments like RFID, sensors and hand held devices require noncontact automatic identification technology. The wireless communication channel of these systems is vulnerable to various malicious attacks and has limited calculation resources and small storage capacity, aimed at these problems, a HMAC-based lightweight authentication protocol has been proposed. The...

    Provided By Global Journals

  • White Papers // Jul 2012

    Analysis and Strategy for the Performance Testing in Cloud Computing

    The aim of this paper is to analysis and presents some ideas on performance testing in Cloud Computing. Performance is an important factor in testing a web application. Performance testing in cloud computing is different from that of traditional applications. The authors' research methodology in this paper includes an overview...

    Provided By Global Journals

  • White Papers // May 2013

    Application Deployment Models with Load Balancing Mechanisms using Service Level Agreement Scheduling in Cloud Computing

    Cloud computing is a market-oriented computing paradigm with virtually unlimited scalable high performance computing resources. The High level middleware services for cloud computing and cloud workflow systems are research frontier for both cloud computing and workflow technologies. In this paper, the extension of Cloud management infrastructure with Service Level Agreement...

    Provided By Global Journals

  • White Papers // Jul 2013

    Secure Cloud Architecture for Preserving Privacy in Cloud Computing using OTP/WTP

    Cloud computing is an On-demand self-service Internet infrastructure where a customer can pay and use only what is needed, managed by an API. The SP plays an active role in transmitting information across the cloud. The main objective of the proposed architecture is preserving the privacy of the information ensuring...

    Provided By Global Journals

  • White Papers // May 2013

    Survey on Efficient Audit Service to Ensure Data Integrity in Cloud Environment

    Cloud computing is an internet based computing which provides different users an opportunity to store their data in the cloud. While data outsourcing relieves the owner of the burden of the local data storage and maintenance but as they have no longer physical possession of outsourced data makes data integrity...

    Provided By Global Journals

  • White Papers // May 2013

    Close to Real-Time Suggestion of File-Stage Mutations From Virtual Disk Marks

    The authors describe a new mechanism for cloud computing enabling close to real-time monitoring of virtual Disk Mark streams across an entire cloud. Their solution has low IO overhead for the guest VM, low latency to File-Stage mutation notification, and a layered design for scalability. They achieve low IO overhead...

    Provided By Global Journals

  • White Papers // Jan 2014

    TPA Ensuring Data Integrity in Cloud Environment

    Cloud computing is an internet based computing where virtual shared servers provide software, infrastructure, platform and other resources to customers on a pay-as-you-use basis. In one of the services offered by cloud viz. Storage-as-a-Service (SaaS), users outsource their data to cloud without having direct possession or control on it. Storage...

    Provided By Global Journals

  • White Papers // Oct 2010

    Aes Algorithm Using 512 Bit Key Implemented For Secure Communication

    In this paper, the authors provide stronger security for communication over the Internet by enhancing the strength of the AES algorithm. Rijndael's algorithm was selected as the Advanced Encryption Standard (AES). The AES algorithm was believed to provide much more security without any limitations. But, recently some breaking methods on...

    Provided By Global Journals

  • White Papers // Dec 2012

    Secure Key Distribution using Quantum Cryptography

    Cryptography plays a vital role in Internet based applications. Present cryptographic systems on classical computers are providing sufficient security by utilizing symmetric and asymmetric cryptographic technologies but the advent invention of quantum computer makes the present asymmetric cryptographic systems vulnerable. The Quantum theory, which makes present cryptographic systems vulnerable, provides...

    Provided By Global Journals

  • White Papers // Jan 2012

    A Survey of Elliptic Curve Cryptography Implementation Approaches for Efficient Smart Card Processing

    Smart cards have been used for many different purposes over the last two decades, from simple prepaid credit counter cards used in parking meters, to high security identity cards intended for national ID programs. This has increased data privacy and security requirements. Data protection and authentication is now demanded for...

    Provided By Global Journals

  • White Papers // Apr 2012

    Optimal Rules Identification for a Random Number Generator Using Cellular Learning Automata

    The cryptography is known as one of most essential ways for protecting information against threats. Among all encryption algorithms, stream ciphering can be indicated as a sample of swift ways for this purpose, in which, a generator is applied to produce a sequence of bits as the key stream. Although...

    Provided By Global Journals

  • White Papers // Jul 2012

    New Techniques for Hardware Implementations of SHA

    Secure Hash Algorithms (SHA) are one of the forms of cryptographic algorithms. SHA hash functions are widely used security constructs. However, they are software implementations of SHA. This paper proposes techniques for hardware implementation of SHA. In order to provide security and improve performance, these methods are used in hardware...

    Provided By Global Journals

  • White Papers // Aug 2011

    Key Protocol Coordination in Mobile Ad-Hoc Networks

    In this paper, the authors propose and design key authentication protocols for wireless networks. They consider three mobile service domains; each has an authentication server. They denote by D1, D2 and D3 corresponding authentication servers. For simplicity, let D1, D2,D3 represent those three domains. This mobile system can provide mobile...

    Provided By Global Journals

  • White Papers // Feb 2014

    Performance Analysis of Secure Integrated Circuits using Blowfish Algorithm

    Security is an essential feature of Information Communication Technology (ICT). Information has to be encrypted at the transmitter side to maintain secrecy and decrypted at the receiver side to retrieve the original information for secure data transmission over insecure computer data communication networks. This paper analyzes the performance metrics of...

    Provided By Global Journals

  • White Papers // Dec 2012

    Efficient Authentication in RFID Devices Using Et Al's Algorithm

    Security plays a vital role during the transmission of private data from one sender to the other. Although there are many security algorithms implemented but here, the authors are providing the security algorithms on the RFID devices. The authentication techniques implemented in RFID is based on the new algorithm based...

    Provided By Global Journals

  • White Papers // Jun 2012

    Feature Selection Method for Iris Recognition Authentication System

    Iris-based biometric authentication is gaining importance in recent times. Iris biometric processing however, is a complex process and computationally very expensive. In the overall processing of iris biometric in an iris-based biometric authentication system, feature selection is an important task. In feature selection, the authors extract iris features, which are...

    Provided By Global Journals

  • White Papers // Sep 2013

    FPR a Secure and Secured Biometric in Web Banking-Survey

    Today, attributable to the vulnerability of normal authentication system, crime has accumulated among the past few years. Identity authentication in web banking depends on biometric feature like face, iris, voice, hand mathematics, handwriting, retina; fingerprints can significantly decrease the fraud. In order that they unit being replaced by biometric authentication...

    Provided By Global Journals

  • White Papers // Apr 2011

    Security Issues and Solutions in Multicast Environment through Tree based Scheme

    Multicast is the delivery of a message or information to a group of destination computers simultaneously in a single transmission from the source creating copies automatically in other network elements, such as routers, only when the topology of the network requires it. Multicasting security is hard because of Open group...

    Provided By Global Journals

  • White Papers // May 2013

    A Review of NTLM Rainbow Table Generation Techniques

    Rainbow tables reduce the difficulty in brute force cracking a single password by creating a large pre-generated data set of hashes from nearly every possible password Rainbow Tables. This method, known as the Faster Time-Memory Trade-off Technique, is based on research by Martin Hellman & Ronald Rivest done in the...

    Provided By Global Journals

  • White Papers // Apr 2011

    Highly Secure and Reliable User Identification Based on Finger Vein Patterns

    With the evolution of consumer electronics technologies, personal information in consumer devices is becoming increasingly valuable. To protect private information from misuses due to the loss or theft, secure user identification mechanisms should be equipped into the consumer devices. Biometrics based personal identification is regarded as an effective method for...

    Provided By Global Journals

  • White Papers // Mar 2011

    Strengths and Weaknesses of Near Field Communication (NFC) Technology

    In this paper, the authors give a comprehensive analysis of security with respect to NFC. They propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. The paper introduced an NFC specific key agreement mechanism, which provides...

    Provided By Global Journals

  • White Papers // Feb 2012

    Analysis of Existing Privacy-Aware Access Control for ECommerce Application

    Due to the growing use of the internet, more and more critical processes are running over the web such as e-commerce. Internet allows commerce and business between parties who are physically distant and do not know each other doing the transaction. For the effective operation of the web application and...

    Provided By Global Journals

  • White Papers // Jun 2013

    A Framework for Cross-Platform E-Commerce Website Development for Multiple Devices and Browsers

    In this paper, the authors has to identify Human-Computer Interaction (HCI) design methods and techniques for the development of cross-platform e-commerce websites that can be used on multiple devices with different screen sizes and web browsers. The findings presented here are based on a theoretical framework consisting of three categorizations:...

    Provided By Global Journals

  • White Papers // May 2013

    Robust Automatic Face Recognition

    The crux of the character identification problem is to exploit the relations between videos and the associated texts in order to label the faces of characters with names. It has similarities to identifying faces in news videos. However, in news videos, candidate names for the faces are available from the...

    Provided By Global Journals

  • White Papers // Mar 2013

    Performance Analysis of Gray Scale and Color Iris with Multidomain Feature Normalization and Dimensionality Reduction

    Iris recognition techniques have come a long way since the preliminary proposal by the researcher. There are several techniques which mainly focus on improving the performance of IRIS recognition system either with the help of improved classifier or the feature set. However, the authors have proved that the performance of...

    Provided By Global Journals

  • White Papers // Oct 2010

    An Efficient Technique For Iris Data Compression An Algorithm By Bezier Curve Approach

    Iris is a strong biometric tool used for human authentication. In this methodology, the patterns in the iris such as rings, furrows and freckles can be envisaged a set of Bezier curves and hence represented by the corresponding Bezier points, resulting in considerable reduction in the file size. After the...

    Provided By Global Journals