International Institute of Information Technology

Displaying 1-19 of 19 results

  • White Papers // Sep 2013

    Learning Fingerprint Orientation Fields Using Continuous Restricted Boltzmann Machines

    The authors aim to learn local orientation field patterns in fingerprints and correct distorted field patterns in noisy fingerprint images. This is formulated as a learning problem and achieved using two continuous restricted Boltzmann machines. The learnt orientation fields are then used in conjunction with traditional Gabor based algorithms for...

    Provided By International Institute of Information Technology

  • White Papers // Aug 2013

    Cryptography Challenges for Computational Privacy in Public Clouds

    Computational privacy is a property of cryptographic system that ensures the privacy of data (and/or operations) while being processed at an untrusted server. Cryptography has been an indispensable tool for computer security but its readiness for this new generational shift of computing platform i.e. cloud computing is still questionable. Theoretical...

    Provided By International Institute of Information Technology

  • White Papers // Jun 2013

    Conception of Bi-Fold Authenticated Agent - Monitored Transaction Architecture

    In this paper the authors provide an introduction towards the architectural design of a bi-fold authenticated agent-monitored transaction model. The focus is primarily on implementation in ATM systems which provide the following facilities of withdrawing currency at any remote terminal, verification of the end users identity using personal identification number...

    Provided By International Institute of Information Technology

  • White Papers // Mar 2013

    Analysis of Cloud Computing Security Considerations for Platform as a Service

    Cloud Computing is an IT model or computing environment which is composed of IT components (hardware, software, networking, and services) as well as the processes around the deployment of these elements that together enable users to develop and deliver cloud services via the Internet or a Private network. Cloud users...

    Provided By International Institute of Information Technology

  • White Papers // Jan 2013

    A Hybrid Approach To Live Migration Of Virtual Machines

    The authors present, discuss and evaluate a hybrid approach of live migrating a virtual machine across hosts in a Gigabit LAN. Their hybrid approach takes the best of both the traditional methods of live migration - pre and post-copy. In pre-copy, the CPU state and memory is transferred before spawning...

    Provided By International Institute of Information Technology

  • White Papers // Aug 2012

    Confidentiality Without Encryption for Cloud Computational Privacy: Chaffing and Winnowing in Computational-Infrastructure-as-Service

    Advances in technology has given rise to new computing models where any individual/organization (Cloud Service Consumers here by denoted as CSC's) can outsource their computational intensive tasks on their data to a remote Cloud Service Provider (CSP) for many advantages like lower costs, scalability etc. But such advantages come for...

    Provided By International Institute of Information Technology

  • White Papers // Aug 2012

    Confidentiality Without Encryption for Cloud Computational Privacy

    Advances in technology has given rise to new computing models where any individual/organization (Cloud Service Consumers here by denoted as CSC's) can outsource their computational intensive tasks on their data to a remote Cloud Service Provider (CSP) for many advantages like lower costs, scalability etc. But such advantages come for...

    Provided By International Institute of Information Technology

  • White Papers // Jun 2012

    Combining Server and Storage Virtualization: A New Dimension for SMB's

    The virtualization wave is quickly reaching its way down into the small-to-medium-sized business. Virtualization provides unmatched flexibility, performance, and utilization by allowing one to move server workloads from one virtual workspace to the next, maximizing server resources on the fly based on one business needs. Server virtualization eliminates the conventional,...

    Provided By International Institute of Information Technology

  • White Papers // Jan 2012

    Doubly Cognitive Architecture Based Cognitive Wireless Sensor Network

    Nowadays scarcity of spectrum availability is increasing highly. Adding cognition to the existing Wireless Sensor Network (WSN) infrastructure will help in this situation. As sensor nodes in WSN are limited with some constrains like power, efforts are required to increase the lifetime and other performance measures of the network. In...

    Provided By International Institute of Information Technology

  • White Papers // Oct 2011

    Design Pattern Recommendation System (Methodology, Data Model and Algorithms)

    Software developers often use design patterns for effectively developing their applications. Design pattern documents are available in various formats, like printed text books and electronic formats. Software engineers entrust these documents for choosing a design pattern and subsequently use the pattern to their design problem. Selecting an appropriate design pattern...

    Provided By International Institute of Information Technology

  • White Papers // Sep 2011

    Doubly Optimal Secure Multicasting: Hierarchical Hybrid Communication Network : Disaster Relief

    Recently, the world has witnessed the increasing occurrence of disasters, some of natural origin and others caused by man. The intensity of the phenomenon that cause such disasters, the frequency in which they occur, the number of people affected and the material damage caused by them have been growing substantially....

    Provided By International Institute of Information Technology

  • White Papers // Jun 2011

    Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks

    In this paper, the authors give the minimal connectivity required in a synchronous directed network, which is under the influence of a computationally unbounded Byzantine adversary that can corrupt a subset of nodes, so that secure message transmission is possible between sender S and receiver R. They also show that...

    Provided By International Institute of Information Technology

  • White Papers // Mar 2011

    An Unconditionally Secure Key Management Scheme for Large-Scale Heterogeneous Wireless Sensor Networks

    Key establishment in sensor networks becomes a challenging problem because of the resource limitations of the sensors and also due to vulnerability to physical capture of the sensor nodes. In this paper, the authors propose an unconditionally secure probabilistic group-based key pre-distribution scheme for a heterogeneous wireless sensor network. The...

    Provided By International Institute of Information Technology

  • White Papers // Mar 2011

    An Improved Efficient Key Distribution Mechanism for Large-Scale Heterogeneous Mobile Sensor Networks

    Due to resource constraints of the sensor nodes, traditional public key cryptographic techniques are not feasible in most sensor network architectures. Several symmetric key distribution mechanisms are proposed for establishing pairwise keys between sensor nodes in sensor networks, but most of them are not scalable and also are not much...

    Provided By International Institute of Information Technology

  • White Papers // Mar 2011

    Cryptanalysis and Further Improvement of a Biometric-Based Remote User Authentication Scheme Using Smart Cards

    Recently, Li et al. proposed a secure biometric-based remote user authentication scheme using smart cards to withstand the security flaws of Li-Hwang's efficient biometric-based remote user authentication scheme using smart cards. Li et al.'s scheme is based on biometrics verification, smart card and one-way hash function, and it also uses...

    Provided By International Institute of Information Technology

  • White Papers // Jan 2011

    Secure Message Transmission In Asynchronous Directed Networks

    The authors study the problem of information-theoretically Secure Message Transmission (SMT) in asynchronous directed networks. In line with the literature, the distrust and failures of the network is captured via a computationally unbounded Byzantine adversary that may corrupt some subset of nodes. They give a characterization of networks over which...

    Provided By International Institute of Information Technology

  • White Papers // Jan 2010

    Towards Analyzing Data Security Risks in Cloud Computing Environments

    There is a growing trend of using cloud environments for ever growing storage and data processing needs. However, adopting a cloud computing paradigm may have positive as well as negative effects on the data security of service consumers. This paper primarily aims to highlight the major security issues existing in...

    Provided By International Institute of Information Technology

  • White Papers // Dec 2009

    A Novel Approach to Generate Up-Sampled Tomographic Images Using Combination of Rotated Hexagonal Lattices

    Generation of up-sampled tomographic images via combination of rotated lattices has been explored in. In this paper, the authors evaluate the existing method using real phantom data. Up-sampled tomographic images are generated via combination of rotated hexagonal lattices. Sinogram data is filtered and back-projected on two hexagonal lattices which are...

    Provided By International Institute of Information Technology

  • White Papers // Jul 2009

    Efficient Privacy Preserving Video Surveillance

    Widespread use of surveillance cameras in offices and other business establishments, pose a significant threat to the privacy of the employees and visitors. The challenge of introducing privacy and security in such a practical surveillance system has been stifled by the enormous computational and communication overhead required by the solutions....

    Provided By International Institute of Information Technology

  • White Papers // Jun 2013

    Conception of Bi-Fold Authenticated Agent - Monitored Transaction Architecture

    In this paper the authors provide an introduction towards the architectural design of a bi-fold authenticated agent-monitored transaction model. The focus is primarily on implementation in ATM systems which provide the following facilities of withdrawing currency at any remote terminal, verification of the end users identity using personal identification number...

    Provided By International Institute of Information Technology

  • White Papers // Aug 2012

    Confidentiality Without Encryption for Cloud Computational Privacy: Chaffing and Winnowing in Computational-Infrastructure-as-Service

    Advances in technology has given rise to new computing models where any individual/organization (Cloud Service Consumers here by denoted as CSC's) can outsource their computational intensive tasks on their data to a remote Cloud Service Provider (CSP) for many advantages like lower costs, scalability etc. But such advantages come for...

    Provided By International Institute of Information Technology

  • White Papers // Mar 2011

    An Improved Efficient Key Distribution Mechanism for Large-Scale Heterogeneous Mobile Sensor Networks

    Due to resource constraints of the sensor nodes, traditional public key cryptographic techniques are not feasible in most sensor network architectures. Several symmetric key distribution mechanisms are proposed for establishing pairwise keys between sensor nodes in sensor networks, but most of them are not scalable and also are not much...

    Provided By International Institute of Information Technology

  • White Papers // Mar 2011

    An Unconditionally Secure Key Management Scheme for Large-Scale Heterogeneous Wireless Sensor Networks

    Key establishment in sensor networks becomes a challenging problem because of the resource limitations of the sensors and also due to vulnerability to physical capture of the sensor nodes. In this paper, the authors propose an unconditionally secure probabilistic group-based key pre-distribution scheme for a heterogeneous wireless sensor network. The...

    Provided By International Institute of Information Technology

  • White Papers // Jan 2011

    Secure Message Transmission In Asynchronous Directed Networks

    The authors study the problem of information-theoretically Secure Message Transmission (SMT) in asynchronous directed networks. In line with the literature, the distrust and failures of the network is captured via a computationally unbounded Byzantine adversary that may corrupt some subset of nodes. They give a characterization of networks over which...

    Provided By International Institute of Information Technology

  • White Papers // Jun 2011

    Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks

    In this paper, the authors give the minimal connectivity required in a synchronous directed network, which is under the influence of a computationally unbounded Byzantine adversary that can corrupt a subset of nodes, so that secure message transmission is possible between sender S and receiver R. They also show that...

    Provided By International Institute of Information Technology

  • White Papers // Oct 2011

    Design Pattern Recommendation System (Methodology, Data Model and Algorithms)

    Software developers often use design patterns for effectively developing their applications. Design pattern documents are available in various formats, like printed text books and electronic formats. Software engineers entrust these documents for choosing a design pattern and subsequently use the pattern to their design problem. Selecting an appropriate design pattern...

    Provided By International Institute of Information Technology

  • White Papers // Sep 2011

    Doubly Optimal Secure Multicasting: Hierarchical Hybrid Communication Network : Disaster Relief

    Recently, the world has witnessed the increasing occurrence of disasters, some of natural origin and others caused by man. The intensity of the phenomenon that cause such disasters, the frequency in which they occur, the number of people affected and the material damage caused by them have been growing substantially....

    Provided By International Institute of Information Technology

  • White Papers // Jan 2012

    Doubly Cognitive Architecture Based Cognitive Wireless Sensor Network

    Nowadays scarcity of spectrum availability is increasing highly. Adding cognition to the existing Wireless Sensor Network (WSN) infrastructure will help in this situation. As sensor nodes in WSN are limited with some constrains like power, efforts are required to increase the lifetime and other performance measures of the network. In...

    Provided By International Institute of Information Technology

  • White Papers // Jun 2012

    Combining Server and Storage Virtualization: A New Dimension for SMB's

    The virtualization wave is quickly reaching its way down into the small-to-medium-sized business. Virtualization provides unmatched flexibility, performance, and utilization by allowing one to move server workloads from one virtual workspace to the next, maximizing server resources on the fly based on one business needs. Server virtualization eliminates the conventional,...

    Provided By International Institute of Information Technology

  • White Papers // Dec 2009

    A Novel Approach to Generate Up-Sampled Tomographic Images Using Combination of Rotated Hexagonal Lattices

    Generation of up-sampled tomographic images via combination of rotated lattices has been explored in. In this paper, the authors evaluate the existing method using real phantom data. Up-sampled tomographic images are generated via combination of rotated hexagonal lattices. Sinogram data is filtered and back-projected on two hexagonal lattices which are...

    Provided By International Institute of Information Technology

  • White Papers // Aug 2012

    Confidentiality Without Encryption for Cloud Computational Privacy

    Advances in technology has given rise to new computing models where any individual/organization (Cloud Service Consumers here by denoted as CSC's) can outsource their computational intensive tasks on their data to a remote Cloud Service Provider (CSP) for many advantages like lower costs, scalability etc. But such advantages come for...

    Provided By International Institute of Information Technology

  • White Papers // Sep 2013

    Learning Fingerprint Orientation Fields Using Continuous Restricted Boltzmann Machines

    The authors aim to learn local orientation field patterns in fingerprints and correct distorted field patterns in noisy fingerprint images. This is formulated as a learning problem and achieved using two continuous restricted Boltzmann machines. The learnt orientation fields are then used in conjunction with traditional Gabor based algorithms for...

    Provided By International Institute of Information Technology

  • White Papers // Aug 2013

    Cryptography Challenges for Computational Privacy in Public Clouds

    Computational privacy is a property of cryptographic system that ensures the privacy of data (and/or operations) while being processed at an untrusted server. Cryptography has been an indispensable tool for computer security but its readiness for this new generational shift of computing platform i.e. cloud computing is still questionable. Theoretical...

    Provided By International Institute of Information Technology

  • White Papers // Mar 2013

    Analysis of Cloud Computing Security Considerations for Platform as a Service

    Cloud Computing is an IT model or computing environment which is composed of IT components (hardware, software, networking, and services) as well as the processes around the deployment of these elements that together enable users to develop and deliver cloud services via the Internet or a Private network. Cloud users...

    Provided By International Institute of Information Technology

  • White Papers // Jan 2010

    Towards Analyzing Data Security Risks in Cloud Computing Environments

    There is a growing trend of using cloud environments for ever growing storage and data processing needs. However, adopting a cloud computing paradigm may have positive as well as negative effects on the data security of service consumers. This paper primarily aims to highlight the major security issues existing in...

    Provided By International Institute of Information Technology

  • White Papers // Jan 2013

    A Hybrid Approach To Live Migration Of Virtual Machines

    The authors present, discuss and evaluate a hybrid approach of live migrating a virtual machine across hosts in a Gigabit LAN. Their hybrid approach takes the best of both the traditional methods of live migration - pre and post-copy. In pre-copy, the CPU state and memory is transferred before spawning...

    Provided By International Institute of Information Technology

  • White Papers // Jul 2009

    Efficient Privacy Preserving Video Surveillance

    Widespread use of surveillance cameras in offices and other business establishments, pose a significant threat to the privacy of the employees and visitors. The challenge of introducing privacy and security in such a practical surveillance system has been stifled by the enormous computational and communication overhead required by the solutions....

    Provided By International Institute of Information Technology

  • White Papers // Mar 2011

    Cryptanalysis and Further Improvement of a Biometric-Based Remote User Authentication Scheme Using Smart Cards

    Recently, Li et al. proposed a secure biometric-based remote user authentication scheme using smart cards to withstand the security flaws of Li-Hwang's efficient biometric-based remote user authentication scheme using smart cards. Li et al.'s scheme is based on biometrics verification, smart card and one-way hash function, and it also uses...

    Provided By International Institute of Information Technology