International Journal of Computer Applications

Displaying 1-40 of 4044 results

  • White Papers // May 2014

    Compressing the Data Densely by New Geflochtener to Accelerate Web

    At the present scenario of the internet, there exist many optimization techniques to improve the Web speed but almost expensive in terms of bandwidth. So after a long investigation on different techniques to compress the data without any loss, a new algorithm is proposed based on LZ77 family which selectively...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    An Algorithm for Leakage Power Reduction Through IVC in CMOS VLSI Digital Circuits

    Leakage current in CMOS circuits can be controlled at the circuit level and at the device level as well. One of the circuit level control techniques is the Input Vector Control (IVC). By using IVC, leakage power consumption of a circuit can be reduced in the sleep state. In this...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Dynamic Consolidation of Virtual Machines with Multi-Agent System

    Cloud computing systems supply massive infrastructures for high-performance computing that are flexible as they are able to acclimate to user and application requirements. Cloud computing offers on demand services which are used by virtue of a service-oriented interface that execute the anything-as-a-service archetype. The enlargement of cloud computing has resulted...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Proactive and Adaptive Data Migration in Hierarchical Storage Systems Using Reinforcement Learning Agent

    With the data generation rates growing exponentially, businesses are having a difficult time maintaining data center infrastructure. Hierarchical storage systems has evolved as a better alternate to managing data, as frequently accessed data is placed on higher tiers and the least frequently accessed data on lower tiers. But the data...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Passive Optical Networks Beneficial to Cloud Computing

    The cloud is transforming IT infrastructure and making it possible for any size business to adopt and afford enterprise-class apps, computing and storage without the cost, complexity and constraints of traditional networks. In this paper, the authors focus on BPON (Broadband Passive Optical Network) with Metropolitan Area Network (MAN) in...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Spatial Co-Location Patterns Mining

    Data mining refers to a process of analyzing data from different perspectives and summarizing it into useful information that can be used in variety of data centric applications in real time. Geographical Information System (GIS) combined with data mining has long being an area of research. GIS is a system...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Multi-Functional Social CRM in Cloud with Cross-Platform Mobile Application

    In this paper, the authors try to represent the importance of communication and interaction between an organization and its clients. Cloud CRM (Customer Relationship Model) is a dynamic application that is developed with latest technologies in order to mark a remarking presence of CRM process. This is built as a...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Optimization of Horizontal Aggregation in SQL by Using C4.5 Algorithm

    For efficient analysis of some data mining system and algorithms, data is required in the horizontal aggregated format. In a relational database, datasets are highly normalized and major efforts are required to compute aggregation when they are expected in horizontal form which is suitable for some data mining, statistical and...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Enacted Software Development Process based on Cross Platform Unified Framework in the Context of Investment Banking

    Traditionally, applications were based upon client/ server architecture which takes the user request and process the data at the server via web services and then return the processed data to the client for GUI rendering. Gradually new applications were developed using component based approach wherein the focus was more on...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Falcon-AO++: An Improved Ontology Alignment System

    With the semantic web, data becomes machine-readable and ontologies define the data. Ontologies in any domain are heterogeneous due to rapid increase in ontology development and differences in views of developers. Agents can fully understand the data only if the correspondences between ontologies are known. Various ontology alignment systems have...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Utilizing Round Robin Concept for Load Balancing Algorithm at Virtual Machine Level in Cloud Environment

    Day-by-day increasing traffic on internet introduces the requirement of load balancing concept to get the most utilization of the resources available on Cloud. There are so many complex calculations and concepts implemented to achieve better and better resource utilization and performance. Out of all this complexity the round-robin algorithm provide...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    A Study on Various Data De-Duplication Systems

    Data is the heart of any organization; hence it is necessary to protect it. For doing so, it is the needed to implement a good backup and recovery plan. But the redundant nature of the backup data makes the storage a concern; hence it is necessary to avoid the redundant...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    A Review on Data Security in Cloud Computing

    Cloud computing is an Internet-based computing and next stage in evolution of the internet. It has received significant attention in recent years, but security issue is one of the major inhibitor in decreasing the growth of cloud computing. It essentially shifts the user data and application software to large datacenters...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    A Context-Based Approach to Semantic Correctness

    Research on business processes modeling has extensively studied the structural aspects of business processes. Most business process modeling languages are graph-based and emphasis has been put on structural concerns such as verifying if all jobs terminate properly, if tasks are properly synchronized or if there are sub-procedures that are never...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    A New Approach of Designing a Client/Server Model with Smart Screen

    Computer networks can be used for numerous services; both for companies and for individual. For companies, networks of personal computers using shared servers often provide flexibility and good price/performance ratio. For individuals, networks offer access to a variety of information and entertainment resources. For connected terminals of network and the...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Privacy Preserving Data Mining Techniques in a Distributed Environment

    Data storing and retrieving has been important since decades in the world of information. It makes this process prolific, when the retrieved information becomes smartly meaningful. Data mining is this new flavor. In the recent years data mining is a wide spread and active area of research. Its meaningfulness has...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    A Comparative Study of Open Source Operating Systems for Virtualization with Executing Applications

    Virtualization is becoming increasingly popular, both for desktop as well as server systems. It has great demand in Information Technology industry because of inherent benefits like physical resource sharing that result in better utilization and ease in managing the system. Several studies have been done to find out the impact...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    FP Growth Algorithm Implementation

    Data mining is to discover and assess significant patterns from data, followed by the validation of these identified patterns. Data mining is the process to evaluate the data from different perceptions and summarizing it into valuable information. This summarized information consequently can be used to design business strategies to upsurge...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Improve Scheduling Task Based Task Grouping in Cloud Computing System

    In recently years, the Information Communication Technology (ICT) appeared new paradigm of utility computing called cloud computing. The consumer cloud is always important of high performance for cloud computing service and satisfies Service Agree Level (SLA). In cloud computing, there is a need of further improvement in task scheduling algorithm...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Analysis of Different Data Mining Tools Using Classification, Clustering and Association Rule Mining

    Data can be in any form like facts, text or numeric which can be computed by computer. This data when converted to meaningful data becomes information. Knowledge is nothing but useful information. Data mining is process of finding knowledge from huge collection of data. It has various methods to extract...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Implementation of Association Rule Mining Using Reverse Apriori Algorithmic Approach

    Association rule mining is always considered to be the most important task for mining data in almost every field. There have been many algorithms devised for mining frequent patterns till today. Algorithm evolutions started with AIS which was soon upgraded and named as Apriori. Apriori is most widely used algorithm...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Performance Improvement Through Parallelization of Graph Clustering Algorithm

    Clustering is defined as dividing elements in to groups called clusters. Clustering task has been used in many fields including image/video processing, machine learning, data mining, biochemistry and bioinformatics etc. Different types of clustering algorithms have been developed like partitional, hierarchical, graph-based clustering etc. according to the properties of the...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

    The term data security refers to the degree of resistance of protection given to information from unintended or unauthorized access. The core principles of information security remain the same - confidentiality, integrity and availability also referred as CIA triad. With cloud adoption the confidential enterprise data is moved from organization...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    An Association Rule Mining Model for Finding the Interesting Patterns in Stock Market Dataset

    In these days, stock market forecasting is one of the most interesting issues, which has gained a more attention due to vast profits. To precisely predict the price of share and making profits has been always challenging task since the longest period of time. This has engrossed the interest and...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    An Efficient DRAM with Reduced Energy Consumption in Video Driver

    Power reduction in electronic and computing system is one of the basic requirements and is increasingly demanded for the battery operated mobile systems. Although the power is required for every part of the system but the devices accessed most frequently are takes special attention, because the improvement in power dissipation...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Prevention of SQL Injection by Self Generating Triplet Patterns

    In this paper, the authors explain about the new prevention method for SQL injection as it is always the top threat to any web site or web application. The paper focus generation of the pattern from the training query to prevent the SQL injection for the new query by forming...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Linux Based Operating System Proposal for the Acquisition and Processing of Data in Embedded Devices

    The identified optimization techniques applied to the boot loader, kernel, file system and applications greatly reduce the boot time of the operating system in general and increase the execution speed of each application in particular. In this paper, each component showed a notable reduction in the size of the executable...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Pipelined Execution of LTE Algorithms

    To study the latest cellular mobile communication standard and protocols, there should be a publicly available simulation environment to support researchers of the world to do testing, reformulation of the existing technologies and optimization on a common well known platform. A possible solution is offered by open source simulation environment...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Optimising Storage Resource Using Morpheme Based Text Compression Technique

    In this paper, the authors present a text compression technique which utilizes morpheme-based text compression to optimize storage resources. The proposed technique is designed to decompose words into their morphemes and then to produce code representations for compression. The proposed algorithm is implemented using English Language text data and applied...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Privacy in Cloud System

    Cloud computing technology is used as inexpensive systems to gather and utilize computational capability. This technology improves applications services by arranging machines and distributed resources in a single huge computational entity. Clouds consist of data centers which are owned by the same institute. The homogeneity within each data centre in...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Design of a Specific Instructions Set Processor for AES Algorithm

    In this paper, the authors explain about the new architecture for Advanced Encryption Standard (AES) algorithm based on Application Specific Instruction-set Processors (ASIP) design technique is proposed. The basic configuration is developed in order to reduce the execution clock pulses for the main specific instructions. According to the improvement of...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    MR-IDBSCAN: Efficient Parallel Incremental DBSCAN Algorithm Using MapReduce

    Data mining is a combination of three main factors: data, information and knowledge. Data are the most elementary description of the things, events or the activity and transactions. Information is organized data which have some valuable meaning or some useful data. Knowledge is a concept of understanding information based on...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Enhancing the Performance of GPU for Face Detection

    Face detection and tracking is one of the fast-growing subjects in computer vision world, and one of the most processing intensive algorithms due to the variations in the face features. Computer Vision algorithms are considered computationally intensive problems. Face detection is one of the most complex objects to detect due...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Applications of GIS in Business Decision Making: The Case of Egypt

    In this paper, the authors design a geospatial database that can help decision makers select the most perfect locations. This paper also analyzes GIS application with special reference to business administration. The decision makers in business can easily visualize or trace the result that can support the decision making process...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Identity Based Distributed Data Storage Using Digital Signature and Diffie Hellmann Key Exchange Mechanism

    The widespread use of Internet has increased the demand for computing. Grid computing is a large scale heterogeneous distributed system which helps in sharing of resources such as data storage, computational power, network dynamically. Grid security is an important component of computational grid infrastructure grid security solutions addresses critical requirements...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Scalability of Parallel Genetic Algorithm for Two-Mode Clustering

    Data matrix having the same set of entity in the rows and columns is known as one-mode data matrix, and traditional one-mode clustering algorithms can be used to cluster the rows (or columns) separately. With the popularity of use of two-mode data matrices where the rows and columns have different...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    An Analysis of Fuzzy Clustering Methods

    Fuzzy logic is an organized and mathematical method of handling inherently imprecise concepts through the use of membership functions, which allows membership with a certain degree. It has found application in numerous problem domains. It has been used in the interval [0, 1] fuzzy clustering, in pattern recognition and in...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Distributed Sequential Pattern Mining: A Survey and Future Scope

    Distributed sequential pattern mining is the data mining method to discover sequential patterns from large sequential database on distributed environment. It is used in many wide applications including web mining, customer shopping record, biomedical analysis, scientific research, etc. A large research has been done on sequential pattern mining on various...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Mobile Stand-Alone Application Code Off-Loading: Architecture and Challenges

    Dynamically migrating code for execution from a device to a remote server has been a topic of active research for nearly a few years now. With the advent and the rapid growth of mobile devices, this area has been extended to mobile operating systems. Although mobile devices such as phones...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Survey on Feature Selection for Data Reduction

    The storage capabilities and advanced in data collection has led to an information load and the size of databases increases in dimensions, not only in rows but also in columns. Data Reduction (DR) plays a vital role as a data prepossessing techniques in the area of knowledge discovery from the...

    Provided By International Journal of Computer Applications

  • White Papers // May 2012

    Security Engineering in G-Cloud: A Trend towards Secure e-Governance

    Government is now-a-days trying to improve efficiency using technologies from IT industry to stimulate its processes more efficiently and faster. Hence, e-Governance was brought into existence, e-governance provided services like e-banking, fund transfer, e-billing, online registration etc, online. To ameliorate things further and introduce more advantages, it was proposed to...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2013

    Enhancing Security in VANET in Terms of Confidentiality and Authentication

    VANET is very useful for solving traffic related problems and provide safety to lives of drivers and passengers moving on the road. In this paper, the proposed algorithm is helpful in authenticating a user and solving traffic related problems and provide more efficient broadcast system by covering large distance. According...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A Multilevel Security Scheme Based on UNICODE and RGB Color Model Using DNA Cryptography

    RGB color oriented DNA based computing is a new research area in cryptography. In this paper, a formal approach to encrypt and decrypt information using colors is proposed. An information or message consists of set of characters, symbols, and digits. Encoding is done using UNICODE, so that any language can...

    Provided By International Journal of Computer Applications

  • White Papers // May 2012

    Implementation of Security Services in LMA Based Multicast Key Management Scheme for Proxy Mobile Ipv6 Networks

    Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol to support Mobile Nodes (MNs) for IP with mobility, without requiring the participation of MNs in any mobility-related signaling. Network based mobility management protocol is more advanced from the host based mobility protocol. Recently, multicast issues in PMIPv6 networks have...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Security in Wireless Sensor Networks using Frequency Hopping

    A Wireless Sensor Network (WSN) is a collection of thousands of tiny sensor nodes having the capability of wireless communication, limited computation and sensing. These networks are vulnerable to internal and external attacks due to the lack of tamper-resistant packaging and the insecure nature of wireless communication channels. Since most...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2011

    Improving Security of E-Commerce Application by Using Multifactor Authentication

    All e-commerce environments require support for security properties such as authentication, authorization, data confidentiality, and non -repudiation. The most common method of authentication or protection against intrusion in a computer system is to use alphanumeric usernames and password. Choosing a strong password and protecting the chosen password has always been...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2013

    Towards an Approach for Improved Security in Wireless Networks

    With increase in the use of internet there has been an increased opportunity in identity fraud, organized crime and various other forms of cyber-crime. For high security transmission over a network, high randomness is required in the seed used for generating a key. This paper deals with two phenomena: biometric...

    Provided By International Journal of Computer Applications

  • White Papers // May 2011

    Implementation of Highly Efficient Authentication and Transaction Security

    Kerberos is a network authentication protocol & is designed to provide strong authentication for client/server applications by using secret-key cryptography. The authors' was aimed at enhancing the security of transactions over a network. In this paper, they used Kerberos Encryption Technique for authentication and transaction security in the network. Further,...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Architecting the Network for the Cloud using Security Guidelines

    Cloud computing is the latest emerging technology which offers reduced capital expenditure, complexity, operational risks, maintenance, and increased scalability while providing the services at different abstraction levels, namely Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS). A new approach called cloud networking that enables and adds the networking functions and resources...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2013

    Secure Routing in Wireless Sensor Networks: A State of the Art

    Wireless Sensor Networks (WSNs) have attracted intensive interest from both academia and industry due to their wide application in civil and military scenarios. Recently, there is a great interest related to routing process in WSNs. Security aspects in routing protocols have not been given enough attention, since most of the...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2013

    Enhancing Data Security in Cloud Using Shuffling and Distribution Algorithm

    Cloud computing is a technology which is used to provide service over internet by means of computing resources (hardware and software). This paper describes conversion of data into images and the numbered images are shuffled using fisher Yates shuffling algorithm which randomly shuffles the image until nothing is left. However,...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2013

    Different Aspect Grid Security; Based on User Authenticity and Message-Based Security Service: A Review

    Today, individuals and institutions in science, research organization and industry are increasingly forming virtual organizations to pool resources and tackle a common objective. Massive amount of information has been passed not only confined into particular country but also spread out across the globe. Participants in virtual organizations commonly need to...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2013

    An Approach to Enhance Security of Cloud Computing Services Using Software Engineering Model

    Cloud computing has great prospective of benefitting rigorous computational supremacy to the civilization society at reduced price. It facilitates consumers amid restricted computational assets to subcontract their bulky computational work assignments to the cloud, and cost-effectively have the benefit of the immense computational supremacy, bandwidth, storage, and even suitable software...

    Provided By International Journal of Computer Applications

  • White Papers // May 2012

    Analysis of Mobile IP Protocols Security

    After the evolution from 2G to 3G and now 3G to 4G, 4G will be based on the transmission of IP packets only, using an architecture known as mobile IPv6. This paper describes the route optimization between Mobile IPv6 nodes which introduced several vulnerabilities in mobile environment. The authors first...

    Provided By International Journal of Computer Applications

  • White Papers // May 2012

    Distributed Combined Authentication and Intrusion Detection in High-Security Mobile Ad Hoc Networks to Reduce the Computation Complexity

    Multimodal biometric technology provides potential solutions for continuous user-to-device authentication in high security Mobile Ad-hoc NETworks (MANETs). This paper studies distributed combined authentication and intrusion detection with data fusion in such MANETs. Multimodal biometrics is deployed to work with Intrusion Detection Systems (IDS) to alleviate the shortcomings of unimodal biometric...

    Provided By International Journal of Computer Applications

  • White Papers // May 2012

    Optimized Secure Data Delivery Based on Randomized Routing in Wireless Sensor Networks

    Security and energy restriction are of most concern in pushing the success of Wireless Sensor Networks (WSNs) for their wide deployment. Despite years of much intensive research, deploying secure communication between wireless nodes remains the cumbersome setup process. Due to the deprived physical layout of sensor nodes, it is generally...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Network Security Vulnerabilities Heading for Malicious Attack

    An organization requires that WLAN must address three critical areas: data confidentiality and integrity, authentication and access control and intrusion detection and prevention. By the growth of wireless network, so many security threats have also been raised that does not require much expertise and expensive equipment to launch an attack...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Novel Time Based Authentication Technique for Enhancing Grid Computing Security

    Secure data communication is the most vital and crucial concern in Grid computing environment, where data flows across multiple components in different organizational domains that are not under control of the single data proprietor. An appropriate authentication mechanism is the very basic requisite for building a protected grid environment. In...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2013

    APSAR: Anonymous Position Base Security Aware Routing Protocol for MANETs

    In major scenarios of Mobile Ad-hoc NETworking (MANET), nodes communicate to each other based on public identities. But while considering applications such as military and law enforcement domains nodes should not expose their identities and node movements should be untraceable. So, alternately, nodes need to communicate based on their current...

    Provided By International Journal of Computer Applications

  • White Papers // May 2012

    Secure Sensor Node Authentication in Wireless Sensor Networks

    Wireless sensor networks are usually installed in rough environments and sometime when the traditional network fails to deploy on that environments. The nodes in the network collect data and information from its environment. These data are moves from one node to another. All the data are not publicly accessible; some...

    Provided By International Journal of Computer Applications

  • White Papers // May 2013

    Mining DoS Attack Sequences on Network Traffic Using Fuzzy Time Interval

    Intrusion of network which couldn't be analyzed, detected and prevented may make whole network system paralyze while the abnormal detection can prevent it by detecting the known and unknown character of data. Many intrusions aren't composed by single events, but by a series of attack steps in chronological order. Analyzing...

    Provided By International Journal of Computer Applications

  • White Papers // May 2013

    Activity Modeling and Threat Taxonomy for Context Aware Proactive System (CAPS) in Smart Phones

    Mobile technology and Internet is becoming an integral part of the people daily life. Widespread usage of smart phones and its greater in-built functionality have provided portability to perform transaction like shopping, ticket booking and banking transactions on the fly. In mobile computing, the characteristic like context awareness allows to...

    Provided By International Journal of Computer Applications

  • White Papers // May 2013

    Comparative Analysis of Existing Dynamic Load Balancing Techniques

    The anticipated uptake of Cloud computing, built on well-established research in Web Services, networks, utility computing, distributed computing and virtualization, will bring many advantages in cost, flexibility and availability for service users. Cloud is based on the data centers which are powerful to handle large number of users. As the...

    Provided By International Journal of Computer Applications

  • White Papers // May 2013

    A Novel Approach for Selection of Appropriate Software as a Service in Cloud Computing

    Cloud Computing is an awesome technology. It has to go-ahead and annexes the computing world. The development of cloud computing embed its sprouting continually in the recent era. Cloud Computing have contrived clan very lavish comfortable to perform their chore. As its fundamental definition says that as-you-pay-as-you-go. In this paper,...

    Provided By International Journal of Computer Applications

  • White Papers // May 2013

    An Approach to Security, Performance and Bandwidth Issues in ASP.NET Websites

    The global presence of ASP.NET websites is increasing with each passing day. With increase in the number of ASP.NET websites, issues pertaining to website's security vulnerabilities, performance and bandwidth have come up to the surface. The security vulnerabilities in a website enable access to critical data and resources of the...

    Provided By International Journal of Computer Applications

  • White Papers // May 2013

    A Certificateless Authentication Key Agreement Protocol to Mitigate MITM and Key-Compromise Impersonation Attacks

    To overcome the key escrow issues of the identity based cryptography, the researchers proposed a new CertificateLess Two-party Authentication Key Agreement (CL-2AKA) protocol. In this paper an improved CL-2AKA Protocol has been proposed. The proposed protocol CAKA (Certificateless Authentication Key Agreement Protocol) is based on the algebraic properties of the...

    Provided By International Journal of Computer Applications

  • White Papers // May 2013

    Generic Software Risk Management Framework for SCADA System

    Supervisory Control And Data Acquisition(SCADA) systems is one of important software systems which are used for monitoring and controlling industrial systems that are geographically spread over thousands of kilometers. These systems need to monitor and control so many field sites through thousands of devices that are varying in type, technology...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2011

    Iris Biometric Recognition for Person Identification in Security Systems

    The security is an important aspect in the people daily life whichever the system the authors consider security plays vital role. The biometric person identification technique based on the pattern of the human iris is well suited to be applied to access control and provides strong e-security. Security systems having...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2011

    Security Analysis in Hierarchical Resource Arrangements in Grid Computing

    As the days going on, desires of netizens increases to meet unforeseen emergency online demands for accessing the services, owning the resources for required period which exists in the e-pool distributive. The needs met by the on-the-fly framed infrastructure (i.e.) virtual organization which assimilates the dynamic collection of diverse resources...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2013

    Security Testing in Requirements Phase of SDLC

    The importance and real potential of security in Requirements Engineering (RE) is now being well recognized. The inclusion of security controls and measures during the requirements phase helps to design, implement, develop and maintain secure and cost effective software. Security testing is one of the prominent techniques to reveal defects...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Use of Digital Signature and Rijndael Encryption Algorithm to Enhanced Security of Data in Cloud Computing Services

    Cloud computing is an amazing technology above all other types of computing. Cloud computing implies sharing of computing resources rather than having local servers or personal individual devices to handle the applications. The goal of cloud computing is to increase the speed of computations per second by applying traditional supercomputing,...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Trust Certificate Sequence Exchange (TCSE) for Black Hole Detection in MANET: Reliability Value Based Approach

    A mobile ad hoc network is a temporary network based on movable nodes within a specific range. Due to this motion the information related to nodes is continually changes likewise the addition of new node and its deletion from network is required. Due to this the authenticity of node must...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    An Investigation on the Issues in Cloud Data Security

    Cloud computing is one of the most fascinating technologies which attract the users to outsource their data from local to remote cloud servers using Internet. A large number of cryptographic schemes are available to encrypt the sensitive information and to protect data. Even though it protects the data but it...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    CDTRB: QoS Based Dynamic Topology Control for Ad-Hoc Network

    MANET is an infrastructure less ad hoc network in which nodes can move freely between specific regions. In this region multiple nodes can communicate with each other. Due to this heavy movement of nodes the topology of the connections is continuously changing within a specific transmission range of the network....

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Approach Towards Optimum Data Transfer with Various Automatic Variable Key (AVK) Techniques to Achieve Perfect Security with Analysis and Comparison

    In all cryptosystem the key challenge of the designer is to make key unbreakable. Shannon proposed that key would be impossible to break if the key is made time variant. The time variant key can be implemented by changing key from session to session. AVK was one of the noble...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Surface EMG Signal Amplification and Filtering

    ElectroMyoGraphic (EMG) signals have been widely employed as a control signal in rehabilitation and a means of diagnosis in health care. Signal amplification and filtering is the first step in surface EMG signal processing and application systems. The characteristics of the amplifiers and filters determine the quality of EMG signals....

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Enabling Indirect Mutual Trust for Cloud Storage Systems

    Cloud computing is a forthcoming revolution in Information Technology (IT) industry because of its performance, accessibility, low cost and many other luxuries. It provides gigantic storage for data and faster computing to customers over the internet. It essentially shifts the database and application software to the large data centers, i.e.,...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Analyzing the Efficiency of the Packet Hiding Methods Based on the Strong Hiding Commitment Scheme (SHCS)

    In this paper the authors describes about analyze the packet hiding methods. These methods are efficiently hiding the data packets while transferring in the network Medias. To protect the system from the unauthorized users, unauthorized programs, threaten the confidential matters and confirm the system availability to the legal users. The...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    A Novel Method to Access BIOS Through Client Server Technology

    Everyone has secrets and some have more than others. Each and every one wanted to have their data and information to be more secure and confidential. There are many ways to maintain the data and information to be safe. This paper is to be maintained the file or data to...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    An Efficient Security Mechanism to Detect the Packet Droppers in a MANET Under Individual and Collusive Adversarial Models

    Most of the existing security mechanisms for detecting the packet droppers in a mobile ad hoc network generally detect the adversarial nodes performing the packet drop individually wherein false accusations upon an honest node by an adversarial node are also possible. In this paper, the authors propose a security mechanism...

    Provided By International Journal of Computer Applications