Haldia Institute of Technology

Displaying 1-4 of 4 results

  • White Papers // Jun 2012

    Revisiting Dedicated and Block Cipher Based Hash Functions

    A hash function maps a variable length input into a fixed length output. The hash functions that are used in the information security related applications are referred as cryptographic hash functions. Hash functions are being used as building blocks of many complex cryptographic mechanisms and protocols. Construction of a hash...

    Provided By Haldia Institute of Technology

  • White Papers // Jan 2012

    Analysis of SQL Injection Attack

    SQL injection attacks are a serious security threat to Web applications. They allow attackers to obtain unrestricted access to the databases underlying the applications and to the potentially sensitive information these database contain. Various researchers and practitioners have proposed various methods to address the SQL injection problem. To address this...

    Provided By Haldia Institute of Technology

  • White Papers // Dec 2010

    The Green Grid Saga - A Green Initiative to Data Centers: A Review

    Information Technology (IT) significantly impacts the environment throughout its life cycle. Most enterprises have not paid enough attention to this until recently. IT's environmental impact can be significantly reduced by behavioral changes, as well as technology changes. Given the relative energy and materials inefficiency of most IT infrastructures today, many...

    Provided By Haldia Institute of Technology

  • White Papers // Dec 2010

    A Novel Embedded Statistical Scheduler for Realising High System-QoS

    Development of schedulers for real-time embedded systems is an emerging area of research as it addresses timely scheduling issues like co-operative scheduling, pre-emptive scheduling, micro-kernel based scheduling, etc. Use of statistical schedulers over deterministic schedulers offers the advantage of improved bandwidth utilization, better delay and resource management, higher throughput and...

    Provided By Haldia Institute of Technology

  • White Papers // Jun 2012

    Revisiting Dedicated and Block Cipher Based Hash Functions

    A hash function maps a variable length input into a fixed length output. The hash functions that are used in the information security related applications are referred as cryptographic hash functions. Hash functions are being used as building blocks of many complex cryptographic mechanisms and protocols. Construction of a hash...

    Provided By Haldia Institute of Technology

  • White Papers // Dec 2010

    The Green Grid Saga - A Green Initiative to Data Centers: A Review

    Information Technology (IT) significantly impacts the environment throughout its life cycle. Most enterprises have not paid enough attention to this until recently. IT's environmental impact can be significantly reduced by behavioral changes, as well as technology changes. Given the relative energy and materials inefficiency of most IT infrastructures today, many...

    Provided By Haldia Institute of Technology

  • White Papers // Dec 2010

    A Novel Embedded Statistical Scheduler for Realising High System-QoS

    Development of schedulers for real-time embedded systems is an emerging area of research as it addresses timely scheduling issues like co-operative scheduling, pre-emptive scheduling, micro-kernel based scheduling, etc. Use of statistical schedulers over deterministic schedulers offers the advantage of improved bandwidth utilization, better delay and resource management, higher throughput and...

    Provided By Haldia Institute of Technology

  • White Papers // Jan 2012

    Analysis of SQL Injection Attack

    SQL injection attacks are a serious security threat to Web applications. They allow attackers to obtain unrestricted access to the databases underlying the applications and to the potentially sensitive information these database contain. Various researchers and practitioners have proposed various methods to address the SQL injection problem. To address this...

    Provided By Haldia Institute of Technology