IIT

Displaying 1-11 of 11 results

  • White Papers // Jan 2014

    A Dual Framework and Algorithms for Targeted Data Delivery

    A variety of emerging wide area applications challenge existing techniques for data delivery to users and applications accessing data from multiple autonomous servers. In this paper, the authors develop a framework for comparing pull based solutions and present dual optimization approaches. The first approach maximizes user utility while satisfying constraints...

    Provided By IIT

  • White Papers // Jan 2013

    Security Verification Using Crowd Sourcing

    X-as-a-service is gaining widespread attention in recent years. SECaaS (SECurity-as-a-Service) is no exception. In this paper, the authors propose a secure architecture using crowd sourcing for security verification as a service. This architecture relies on the collaboration and volunteer contribution of resources by various users, to reduce total cost of...

    Provided By IIT

  • White Papers // Aug 2012

    Building Resilient Cloud Over Unreliable Commodity Infrastructure

    Cloud Computing has emerged as a successful computing paradigm for efficiently utilizing managed compute infrastructure such as high speed rack-mounted servers, connected with high speed networking, and reliable storage. Usually such infrastructure is dedicated, physically secured and has reliable power and networking infrastructure. However, much of user's idle compute capacity...

    Provided By IIT

  • White Papers // Mar 2012

    Privacy-Preserving Interest-Casting in Opportunistic Networks

    Message forwarding is a fundamental brick to spread information among users in opportunistic networks. In this paper, the authors consider the recently proposed interest-casting networking primitive for opportunistic networks, according to which a packet generated by a sender should be delivered to all users in the network - potentially unknown...

    Provided By IIT

  • White Papers // Dec 2011

    Path Congestion Control in Centralized Autonomous System

    In this paper, the authors analyze the importance of a centralized controller based system with congestion over the network. Some previous researches show validity of the centralized controller by experiments. However, the effectiveness has not proved analytically. Therefore, this paper provides an idea for the congestion control over the path...

    Provided By IIT

  • White Papers // Oct 2011

    UsiFe: An User Space Filesystem with Support for Intra File Encryption

    In this paper, the authors proposes a new paradigm for the design of cryptographic filesystems. Traditionally, cryptographic file systems have mainly focused on encrypting entire files or directories. In this paper, the authors envisage encryption at a finer granularity, i.e. encrypting parts of files. Such an approach is useful for...

    Provided By IIT

  • White Papers // Jun 2011

    Improving Capacity of Soft Handoff Performance in Wireless Mobile Communication Using Macro Diversity

    The soft handoff is a process on transferring the on going call from one radio resource to another radio resource without any interruption. Rather, mobile unit looks next base station for possible new connection without breaking the old connection. This transfer of call takes place, when the mobile unit moves...

    Provided By IIT

  • White Papers // Dec 2010

    Achieving Exponential Diversity With SpatioTemporal Power Allocation With Imperfect Channel State Information

    In this paper, the authors derive conditions under which Spatio-temporal power allocation provides exponential diversity when the quality of Channel State Information at the Transmitter (CSIT) and Receiver (CSIR) degrades. They show that exponential diversity is obtained provided two conditions are satisfied; 1)the feedback rate increases linearly with the Signal-to-Noise...

    Provided By IIT

  • White Papers // Dec 2010

    Cascaded Filtering for Biometric Identification Using Random Projections

    Biometric identification often involves explicit comparison of a probe template against each template stored in a database. This approach becomes extremely time-consuming as the size of the database increases. Filtering approaches use a light-weight comparison to reduce the database to smaller set of candidates for explicit comparison. However, most existing...

    Provided By IIT

  • White Papers // Nov 2008

    Smart Card Library

    Smart cards are one of the most exciting and promising emerging technology in the field of automated identification. Compared to conventional data transmission devices such as magnetic-stripe cards, smart cards offer enhanced security, convenience and economic benefits. They are highly configurable to suit individual needs. But the ultimate utility of...

    Provided By IIT

  • White Papers // Jul 2008

    Evaluation of Security Architecture for Wireless Local Area Networks by Indexed Based Policy Method: A Novel Approach

    In this paper, the authors have focus existing and proposed WLAN security technologies designed to improve 802.11 standard by applying security policies. The authors have extensively analyzed the effect of crypto parameters over WLAN based on packet level characteristics by applying security policy to individual packet. The authors have also...

    Provided By IIT

  • White Papers // Jul 2008

    Evaluation of Security Architecture for Wireless Local Area Networks by Indexed Based Policy Method: A Novel Approach

    In this paper, the authors have focus existing and proposed WLAN security technologies designed to improve 802.11 standard by applying security policies. The authors have extensively analyzed the effect of crypto parameters over WLAN based on packet level characteristics by applying security policy to individual packet. The authors have also...

    Provided By IIT

  • White Papers // Jun 2011

    Improving Capacity of Soft Handoff Performance in Wireless Mobile Communication Using Macro Diversity

    The soft handoff is a process on transferring the on going call from one radio resource to another radio resource without any interruption. Rather, mobile unit looks next base station for possible new connection without breaking the old connection. This transfer of call takes place, when the mobile unit moves...

    Provided By IIT

  • White Papers // Aug 2012

    Building Resilient Cloud Over Unreliable Commodity Infrastructure

    Cloud Computing has emerged as a successful computing paradigm for efficiently utilizing managed compute infrastructure such as high speed rack-mounted servers, connected with high speed networking, and reliable storage. Usually such infrastructure is dedicated, physically secured and has reliable power and networking infrastructure. However, much of user's idle compute capacity...

    Provided By IIT

  • White Papers // Dec 2010

    Achieving Exponential Diversity With SpatioTemporal Power Allocation With Imperfect Channel State Information

    In this paper, the authors derive conditions under which Spatio-temporal power allocation provides exponential diversity when the quality of Channel State Information at the Transmitter (CSIT) and Receiver (CSIR) degrades. They show that exponential diversity is obtained provided two conditions are satisfied; 1)the feedback rate increases linearly with the Signal-to-Noise...

    Provided By IIT

  • White Papers // Dec 2010

    Cascaded Filtering for Biometric Identification Using Random Projections

    Biometric identification often involves explicit comparison of a probe template against each template stored in a database. This approach becomes extremely time-consuming as the size of the database increases. Filtering approaches use a light-weight comparison to reduce the database to smaller set of candidates for explicit comparison. However, most existing...

    Provided By IIT

  • White Papers // Mar 2012

    Privacy-Preserving Interest-Casting in Opportunistic Networks

    Message forwarding is a fundamental brick to spread information among users in opportunistic networks. In this paper, the authors consider the recently proposed interest-casting networking primitive for opportunistic networks, according to which a packet generated by a sender should be delivered to all users in the network - potentially unknown...

    Provided By IIT

  • White Papers // Dec 2011

    Path Congestion Control in Centralized Autonomous System

    In this paper, the authors analyze the importance of a centralized controller based system with congestion over the network. Some previous researches show validity of the centralized controller by experiments. However, the effectiveness has not proved analytically. Therefore, this paper provides an idea for the congestion control over the path...

    Provided By IIT

  • White Papers // Oct 2011

    UsiFe: An User Space Filesystem with Support for Intra File Encryption

    In this paper, the authors proposes a new paradigm for the design of cryptographic filesystems. Traditionally, cryptographic file systems have mainly focused on encrypting entire files or directories. In this paper, the authors envisage encryption at a finer granularity, i.e. encrypting parts of files. Such an approach is useful for...

    Provided By IIT

  • White Papers // Jan 2013

    Security Verification Using Crowd Sourcing

    X-as-a-service is gaining widespread attention in recent years. SECaaS (SECurity-as-a-Service) is no exception. In this paper, the authors propose a secure architecture using crowd sourcing for security verification as a service. This architecture relies on the collaboration and volunteer contribution of resources by various users, to reduce total cost of...

    Provided By IIT

  • White Papers // Jan 2014

    A Dual Framework and Algorithms for Targeted Data Delivery

    A variety of emerging wide area applications challenge existing techniques for data delivery to users and applications accessing data from multiple autonomous servers. In this paper, the authors develop a framework for comparing pull based solutions and present dual optimization approaches. The first approach maximizes user utility while satisfying constraints...

    Provided By IIT

  • White Papers // Nov 2008

    Smart Card Library

    Smart cards are one of the most exciting and promising emerging technology in the field of automated identification. Compared to conventional data transmission devices such as magnetic-stripe cards, smart cards offer enhanced security, convenience and economic benefits. They are highly configurable to suit individual needs. But the ultimate utility of...

    Provided By IIT