International Journal of Computer Applications

Displaying 2881-2920 of 6962 results

  • White Papers // Jun 2013

    GUI Based Testing Tool for DC Machine

    In this paper, the authors are to develop an educational toolbox for analysis of DC machine for students and lecturers. GUI (Graphical User Interface) based simulation tool has been developed for DC machines lab and can be used as an educational tool for analysis of dc machines. GUI figure file...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Proposing an Optimization Algorithm for Employee Competencies Evaluation Using Artificial Intelligence Methods: Bayesian Network and Decision Tree

    Recently, the multidisciplinary research has been highly considered by the computer sciences researchers as it contributes to the innovation in terms of concepts and practices. This paper keeps special focus on the employment of belief network including influence and Bayesian nets models in modeling the uncertainties and decision making process....

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Performance Analysis of Wired and Wireless Network Using NS2 Simulator

    In computer terminology the definition for networks is similar as a group of computers logically connected for the sharing of information or services. In this paper, the authors compared and analyzed the performance of wired and wireless network. In wired network there is only one routing protocol whereas in wireless...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Localization of Nodes: A New Challenge for Wireless Sensor Networks

    With the widespread involvement of low cost, small sized sensor nodes in the WIreless SEnsor NETworks (WISENETs) technology to support variety of collaborative applications such as monitoring and surveillance for civilian as well as military purposes; location aware computing for such nodes is really becoming an important challenge. Localization also...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Efficient QoS-Based Scheduling Mechanisms for IEEE 802.16e Networks

    Users have become more acquainted to broadband access. IEEE 802.16, a standard for broadband wireless communication in Metropolitan Area Networks (MAN) promises to be one of the best wireless access technologies capable of supporting very high bandwidth applications. The main objective of WiMAX is to deliver wireless communications with high...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    A Modified Sensor Network Boundary Discovery Algorithm

    A WSN computer network using sensors is used in important application like environmental monitoring warning dangers to human lives. WSN's may have several problems related to topology construction, maintenance, and connectivity. The deployed sensor devices may have critical resource constraints in terms of energy consumption. Also the algorithms need to...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    AODV, DSDV, DSR Performance Analysis with TCP Reno, TCP New Reno, TCP Vegas on Mobile Ad-Hoc Networks Using NS2

    Mobile Ad-hoc NETwork (MANET) is considered an autonomous collection of wireless mobile nodes that are capable of communicating with each other without the use of a network infrastructure or any centralized Administration. MANETs have a wide range of applications from military to search and rescue operations during disaster. In this...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Effect of Spatial and User Variations on the Performance of VoIP Over WiMAX Network

    WiMAX (Worldwide interoperability for Microwave Access) is one of the hottest broadband wireless access technologies. It is a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL. In this paper, simulative investigations have been done for the WiMAX network using different...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Consumer Trust Model in Online Transaction

    The problem of online trading is lack of trust. Usually it results into difficulty in online transaction between buyer and seller. Trust is defined as willingness of a person to be vulnerable in a circumstance that they cannot control with the positive expectation that the trustee will not take undue...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    A SRAM Memory Cell Design in FPGA

    In this paper, the authors design a memory cell in Field Programmable Gate Array (FPGA) that consumes lesser power with reduced delay constraint. In the existing system, the FPGA is based on 10T Static Random Access Memory (SRAM) cell configuration in which power consumption is relatively high. The proposed paper...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    SRAM Cell Performance in Deep Submicron Technology

    In this paper, the authors deal with the design opportunities of Static Random Access Memory (SRAM) for lower power consumption and propagation delay. Here, they have analyzed both read margin for read ability and write margin for SRAM write ability. Static noise margin affects both read margin and write margin....

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    The Role of Business Process Model in Customer Centric eGovernment System

    The development of customer centric eGovernment systems, for better services and reliable information to citizen, is increasing in developed and developing countries as part of eGovernment initiatives. This paper provides an opportunity to redesign government processes and also to improve efficiency and effectiveness within government institution. A review of literature...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    FP-Tree Based Association Rule Mining in Academic Social Networks to Refine RDF Framework and FOAF

    In order to analyze large scale social networks, different strategies are being implemented. The traditional methods of data mining are getting transformed to be suitable to the requirements of the web based information available in different structured and unstructured formats. The process of web mining, a versatile methodology of data...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    A Novel Framework for Virtual Desktop Environment with vApp

    Virtualization technology is transforming today's IT community, offering new possibilities to improve the performance and efficiency of IT infrastructure by a dynamic mapping of the PC resources, enabling to run several applications and operating systems on a single physical system. Virtualization also offers elevated ease of use and error recovery...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Multiprotocol Gateway for Wireless Communication in Embedded Systems

    In recent times, various types of devices have used wireless technologies such as RF, GSM, Bluetooth and ZigBee, to give innovative means to embedded systems design. The interoperability among wireless protocols on embedded system devices can avail the user numerous functions that maximize the height of usability. Its realization will...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Low Power BiCMOS SRAM Using 0.18'm Technology

    Rapid advances in the field of very large scale system designs brought memory circuits are continuously regulated and in turn, more number of cells could made possible to integrate on small chip. CMOS technology prove boon to memory circuits, which replaced the most of complex circuits to simpler circuits. But...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Performance Analysis and Classification of Clone Attack Detection Procedures in Mobile Wireless Sensor Networks

    Regarding accelerating development of mobile sensor nodes technology, increasing the utilization of them, and also facing with security challenges in these networks; specially clone nodes attack, this paper focuses on exploiting optimum criteria of node clone intrusion detection procedures in mobile wireless sensor networks by using experimental analysis of procedures....

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Performance Comparison Between Relational and Object-Oriented Databases

    An Object-Oriented database can utilize the benefits of both the design and implementation of any application. Due to the increased popularity of database systems many new database systems based on varying data model and implementation have entered in the market. Database systems have complex architecture but they are the key...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Bluetooth Communication Using Hybrid Encryption Algorithm Based on AES and RSA

    A hybrid encryption algorithm based on AES and RSA is proposed to enhance the security of data transmission in Bluetooth communication. E0 algorithm is currently used in transmission of data via Bluetooth between two or more devices. E0 is a 128-bit symmetric stream cipher used in the Bluetooth protocol. Several...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Data Dashboard-Integrating Data Mining with Data Deduplication

    Many applications deal with huge amount of data and that scattered data needs to be transformed into something relevant and meaningful. To make sense of such data is the need of many applications and areas of technology. The data that is already present is very huge, noisy and has a...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Development of Prolog for Database Management System

    The authors know that PROLOG is one of the most popular languages based on an inference mechanism and many expert systems are implemented in PROLOG. In this paper, they have selected this language to express the rules and a PROLOG interpreter and its uses as an inference mechanism, taking the...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    A Novel Approach to Improve Invisibleness and Robustness of a Digital Watermark in Copyright Protection

    Rapid penetration of internet and advancements in communication technology is a paved way to easy access of digital images. Nevertheless, these advancements also create ways for malicious users to pirate and sell the copyrighted content. Digital watermarking techniques have been deployed in combating the piracy issue. The current digital watermarking...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Auction for License Management in Cloud Computing Environment

    Cloud computing is a recent technology for computing through a virtual environment. In cloud computing resources are provided virtually for computation, storage and developing application. To access these resources user will have to take an authentication from the cloud service provider. To get authentication user will have to provide some...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    FPGA Implementation of Multistage Knapsack Public Key Cryptosystem

    In this paper, the authors present hardware implementation of multistage trapdoor knapsack public key cryptosystem which is primarily based on Merkle-Hellman scheme. So far, multistage knapsack is not broken and there has not been known a specific attack against this system. Modular multiplier is the critical and fundamental part of...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Cooperative Bit-Compressed Authentication Scheme Against Compromised Node Attacks in Wireless Sensor Networks

    Sensor nodes deployed at hostile environments suffer compromise node attacks, in which an adversary injects counterfeit data into the sink causing error detection at upper level and energy wastage in en-route sensor nodes. A novel authentication scheme known as, Cooperative Bit-compressed Authentication (CBA) is based on random graph characteristic of...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Cryptanalysis of Blind Signature Schemes

    Security of the consumer's data over internet is the major problem in present time. In this paper, the authors have analyzed blind signature schemes based on RSA and with taking advantage of elliptic curve cryptography to achieve the security goals. Blind signature scheme is one of the security protocol to...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Best Cloud Provider Selection Using Integrated ANP-DEMATEL and Prioritizing SMI Attributes

    The adoption of cloud computing depends upon detailed comparison of cloud provider alternatives with careful consideration. Therefore, poor cloud provider selection can lead to failure in service delivery, compromise data confidentiality and data integrity and loss of meeting clients' demands. Cloud provider selection is a multi criteria decision making problem,...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Chaotic Map Based Block Encryption

    Number of cryptosystems based on chaos has been proposed, in recent years. The researchers' proposed an improved scheme by using a symmetric key block cipher algorithm in which one-dimensional chaotic maps are used, in order to obtain chaotic sequences with better cryptographic feature. In this paper, an encryption/decryption scheme was...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Mapping Process of Relational Schema to OWL Ontologies Using XSLT

    One of the challenges of the semantic Web is to integrate the information already available on the standard Web, usually stored in relational databases. The authors propose in this paper a transformation process from existing relational database schema defined by a set of tables into OWL ontologies using XSLT. This...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Enhancing Email Security by Signcryption Based on Elliptic Curve

    E-mail plays an important role in mankind communication. It is essential to provide security solutions for the secure transmission of email. The currently used protocols such as PGP and S/MIME are based on public key cryptography that involves huge computational costs due to key generation, key exchange and encryption. In...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Web Spam Detection Using Timer with Ranking Technique

    Today, Web Spam is a very serious problem for search engine and for the user. The word Web Spam is the combination of two words i.e. Web and Spam. The word web contains thousands of web pages which are used by various search engines to answer the query of the...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Performance Analysis of Decision Trees

    In data mining, decision trees are considered to be most popular approach for classifying different attributes. The issue of growing of decision tree from available data is considered in various discipline like pattern recognition, machine learning and data mining. This paper presents an updated survey of growing of decision tree...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    New Approach to Mitigate XML-DOS and HTTP-DOS Attacks for Cloud Computing

    Moving towards cloud computing is accelerating and businesses are trying to present their software in the cloud. Cloud uses SOA and web services to present always accessible services which raise up threats and vulnerabilities. Users need to access cloud from anywhere and this availability comes from presenting services as web...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Reverse Host Allocation Approach for Virtual Machine Cloud Computing Environment

    Cloud Computing is one the latest and evolving technology in the coming times. It has evolved as a balloon filled up with immense potential of making the world bloom with its applications. Cloud provides them with the higher degree of capability by using its resources and fulfilling the needs of...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Rules Based Enhancement in Cloud Intrusion Detection System Service

    In cloud environment, chances of intrusion are more with cultivation of intruder's attacks because cloud computing is internet based computing where virtual servers provide software, Platform, Infrastructure or other computing resources to customer on pay-as-you-basis. With increment in need of computing services of cloud computing, demand of security as a...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Cloud Testing- Types, Service Platforms and Advantages

    The software testing is a oppugn for the IT industry to provide the quality product both for the system based or web-based applications. But the recent news of alleged breakdown of many web-based portals of financial institutions, banks and software companies' shows that something is definitely going wrong with the...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    An Implementation of MD5 Hash Algorithm for RFID Tags

    In this paper, the authors discuss RFID technology, and shows the implementation of MD5 hash algorithm for RFID tags to protect private data from counterfeiting and copying. Privacy and security of RFID tags are discussed and the implementation of this algorithm is shown. Authors present new technology of reading the...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    A Vulnerable Scoring Through Code-Based Cloud Storage System with Sheltered Data Forwarding

    Cloud Storage System has a collection of storage servers provides long-standing storage services over the internet. Data privacy becomes a major concern in cloud storage system because user stores their data in third party cloud system. An encryption scheme available for data privacy but it limits the number of functions...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Mining Positive and Negative Sequential Pattern in Incremental Transaction Databases

    Positive and negative sequential patterns mining is used to discover interesting sequential patterns in a incremental transaction databases, and it is one of the essential data mining tasks widely used in various application fields. Implementation of this approach, construct tree for appended transactions and will merge this tree with existing...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    Knowledge Mapping Evolution Guided by Data Mining

    Preserve knowledge, retain know, these are the objectives of a scalable company. The knowledge mapping is graphical techniques which allows preserve and visualize the strategic heritage of the acquired know-how during the years. The authors use Data mining techniques to exploit the different sources of data and to improve the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Reconfigurable Network on Chip Router for Image Processing Based Multiprocessor Applications

    Real time Image Processing (I.P) systems, involving on board multiprocessor communication, use standard bus based communication. The load on the system to deliver the output towards real time standards call for high speeds, but for data intensive application such as IP algorithms require constant transfer of data between the logic...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Failure Risk Exposure based Test Prioritization for Sequential Non-Iterative System

    To test a system a large number of test cases are required to be generated and applied to the candidate system. In most of the methodologies the testing phase is placed at the end of development life cycle. The time constraint is more in this phase as compared to any...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Optimum Body Biasing Technique in Domino Logic Gate Design for Low Power Applications

    Domino CMOS logic circuit family finds a wide variety of applications in microprocessors, digital signal processors, and dynamic memory due to their high speed and low device count. These dynamic circuits are often favored in high performance designs because of the speed advantage offered over static CMOS logic circuits. In...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Analysis of EZW Compression Scheme Applied for ECG Signal Compression

    Although digital storage media is not expensive and computational power has exponentially increased in the recent years, the possibility of ElectroCardioGram (ECG) compression still attracts the attention, due to the huge amount of the growing data that has to be stored or transmitted. The data's growth depends on the factors...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Power Budget Performances of Free Space Optical Link Using Direct Line of Sight Propagation

    Optical Wireless Communication (OWC) systems suffer from average optical signal power loss and random power fading due to the different atmospheric condition. In this paper, the authors propose a model for free space optical link for link distance of 500 meters and the results of this paper show the Power...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Optimization of Apodized Fiber Bragg Grating for Sensing Applications

    This paper presents the modeling and characterization of an Apodized optical fiber Bragg grating for maximum reflectivity and minimum side lobe power wastage and narrow spectral response. The modeling is based upon coupled mode theory together with transfer matrix method. This matrix approach is effective at treating a single grating...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Modulo Based Image Steganography Technique Against Statistical and Histogram Analysis

    Steganography is the art and science of communicating secret data by embedding it into a multimedia carrier. The ultimate goal here is to conceal the very existence of the embedded data. Although the term Steganography has been known for thousands of years, its digital version came about only lately and...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Signcryption Saves Computational and Communicational Costs

    The aim of this paper is to provide an overview for the research that has been done so far in signcryption area. The paper also presents the extentions for the signcryption scheme and discusses the security in signcryption and the practical application of signcryption in real life. Because the elliptic...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Impact of Background Images on the DAS (Draw- A-Secret) Graphical Password Authentication Scheme

    The basic idea of Draw-A Secret technique is that a user is asked to draw a simple picture on a 2D grid. The coordinates of the grid, occupied by the picture are stored in the order of the drawing. During authentication, the user is asked to re-draw the picture. If...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Analysis of Key Management and Quantum Cryptography in Wireless Sensors Networks

    Key management and Quantum Cryptography (QC) are very interesting and challenging areas in Wireless Sensor Networks (WSN). In order to make secure communications around WSN, communication between sensor nodes and base station to sensor node communication should be handled carefully. Today's security around WSN needs efficient key management protocol and...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Chaos Based Encryption and Decryption of Image and Video in Time and Frequency Domain

    Encryption is one of the well-known technique to provide security in transmission of multimedia contents over the internet and wireless networks. The simplest way of encrypting multimedia content is to consider the three-dimensional image or video stream as a one dimensional stream and to encrypt the entire content using standard...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Key Distribution Scheme for Multinode Network

    In order to protect the data from the intruders powerful encryption algorithms with multiple keys has been used over the recent years. Once the encryption process has been done then there is a need to transmit it over the channel. The secured model has been examined on the basis of...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Comprehensive Survey on Game Theory based Intrusion Detection System for Mobile Adhoc Networks

    Mobile Adhoc Networks (MANET's) are autonomous distributed systems that comprise a number of mobile nodes connected by wireless links, forming arbitrary time varying wireless network topologies. Security in mobile ad-hoc networks are particularly difficult to achieve, notably because of the limited physical protection to each of the nodes, the sporadic...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Diverse and Conglomerate Modi-Operandi for Anomaly Intrusion Detection Systems

    Of late, research works on Intrusion Detection System have been receiving a lot of attention. An IDS detects hazard patterns of network traffic on the residual open parts through observing user activities. There are several models available as of now, but the major loop hole in most of the existing...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Methods of Preventing and Detecting Black/Gray Hole Attacks on AODV-Based MANET

    Mobile Ad hoc NETwork (MANET) is constructed from a collection of nodes that can move anywhere and anytime in different areas without any infrastructure. Each node works at the same time as router and host. Lack of a fixed infrastructure, wireless medium and dynamic topology makes MANET vulnerable to different...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Study on Congestion Avoidance in MANET

    Congestion is a main challenge in modern network environment. Unawareness of the network topology the network devices are demand to provide sufficient and structured connection establishment to the network. Nowadays, Mobile Adhoc NETwork (MANET) plays a vital role in the modern networks. Because MANET can constructs its network a find...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Sustainable Performance Bounds at Receivers for Contiguously Framed Server Streamed Video Data for VCR like Functions for Online Video on Demand

    Ideal online Video on Demand (VoD) system should make available any video at any time with smooth VCR like functions such as fast forward, fast backward during playback. Providing them by unicast streaming (dedicated channels) is expensive and ties up resources in networks causing blocks. Video data are bulky and...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    A New Approach to Optical Networks Security: Attack-Aware Routing and Wavelength Assignment

    Normal optical networks can be identified the security issues like routing and wavelength assignment and physical layer attacks problems. Network Operators can be facing the risks at the frequency and wavelength allocation process. Physical layers attacks like high powered jamming of attacks can be occur inside the network. High power...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    An Approach to Wireless Intrusion Detection System for Wireless Network Based on Multiagent System of Ant Colony Optimization Algorithm

    Various approaches to Intrusion Detection are currently being used, but they are relatively ineffective in finding the intruder. Wireless networks are particularly vulnerable to intrusion, as they operate in open medium, and use cooperative strategies for network communications. Artificial Intelligence plays a driving role in security services. In a multisensory...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Simulation of Self-Organized Public-Key Management for Ad Hoc Networks

    In this paper, the authors addressed the difficult problem of key management in mobile ad hoc networks. A self-organized public-key management scheme is proposed that does not rely on any trusted third party, not even in the network initialization phase. To distribute keys to the neighboring nodes they have taken...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    A Symmetric Encryption Scheme for Colour BMP Images

    In this paper, a new image encryption scheme for colour BMP images using a secret key of 120-bits is proposed. Initially, image is divided into blocks subsequently into color components. Each color component is modified by performing bitwise operation which depends on secret key used in algorithm as well as...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    A Novel DNA Based Encrypted Text Compression

    Lack of trust and secrecy for communications laid foundation to a new area of security. Information security concerns with the protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. Hence, encapsulation of the original message with some kind of encryption techniques provides security. Most of...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Fuzzy Logic Based Intrusion Detection System Against Blackhole Attack on AODV in MANET

    Security is an essential feature for wired and wireless network. But due to its unique characteristics of MANETs, it creates a number of consequential security challenges to network. MANETs are vulnerable to various attacks, blackhole is one of the possible attack. In this paper, the authors represent an intrusion detection...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Yukti: A Dynamic Agent Based IDS With Suspect Engine to Detect Diverse XSS Attacks

    Injecting malicious script through links, URLs (Unified Resource Locator) or as user inputs and getting it executed (when inputs are not validated) in the client side is called CROSS Site Scripting (XSS) attack. It is called XSS because the script that is executed here is not originated from the same...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    An Off-Line Electronic Payment Scheme Based on Publicly Verifiable Secret Sharing

    In this paper, the authors introduce a new efficient technique allowing to render an off-line e-cash system traceable without need to a trusted party. The main idea is the use of the publicly verifiable secret sharing technique in order to revoke the anonymity of double spending users. The anonymity of...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Fortification of Transport Layer Security Protocol

    Proving an identity over a public link is complex when there is communication between Client and Server. Secure Shell protocol is deployed, to determine a client's identity through Password-based key exchange schemes, over a public network, by sharing a (short) password only, with a session key. Most of the existing...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Data Security and Access Control for Geospatial Database Sets Using Novel StegoHash Algorithm

    The applications of spatial database (2D and 3D vector maps) are more and more popular in the computer and network environments. It is the reason why information security is an important issue. Data hiding schemes may include map data authentication, secret communication for the purposes of copyright protection, integrity authentication,...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    A Novel Method for Symmetric Encryption Using Split Plaintext Key Pair (Pi,Ki) Algorithm

    Cryptography, defined as the science and study of secret writing, concerns the ways in which communications and data can be encoded to prevent disclosure of their contents through eavesdropping or message interception, using codes, ciphers and other methods, so that only intended people can see the real message. In this...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    A LWE-Based Secret Sharing Scheme

    The authors present a (n,n) secret sharing scheme whose security can be reduced to the hardness of the Learning With Errors (LWE) problem. This is a strong property since the LWE problem is believed to be very hard, as hard as worst-case lattice problems hence offering security in the quantum...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Detecting Zero-Day Attack Signatures Using Honeycomb in a Virtualized Network

    Self-propagating malware, such as worms, have prompted cyber attacks that compromise regular computer systems via exploiting memory-related vulnerabilities which present threats to computer networks. A new generation worm could infect millions of hosts in just a few minutes, making on time human intrusion impossible. The new worms are spread over...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Enhancing Secure File Transfer by Analyzing Repeated Server Based Strategy using Gargantuan Peers (G-peers)

    Peer-to-peer networks are useful for the file transferring within the group of peers in the network. But usually files are transferred in slow speed, if the files are larger in size. Also the peers don't have much utility within them. In order to enhance the utilities of the individual peers,...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Dependent Private Key Generation in NTRU Cryptosystems

    Many of the public key cryptosystems deal with two-party communication keeping confidentiality and authentication as primary goals. However, there are many applications like banking that require multi-party communication. In bank, the people keep valuable articles in lockers. The authors need two dependent keys to open the locker. In corporate sector...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    A Unified Approach for Real Time Intrusion Detection Using Intelligent Data Mining Techniques

    In the recent days, there is a rapid increase in the usage of intelligent data mining approaches to predict intrusion in local area networks. In this paper, an approach for Intrusion Detection System (IDS) which embeds an expert system making data mining technique behave intelligently is proposed. Intrusion Detection System...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2012

    A High-Throughput ASIC implementation of Configurable Advanced Encryption Standard (AES) Processor

    In this paper, a compact and fully pipelined ASIC implementation of AES cryptography algorithm has been presented. The proposed implementation is configurable to take 128, 192 and 256-bit keys according to the requirement of the security level. The proposed architecture is synthesized in 180 nm standard cell CMOS technology and...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Ensuring Authentication and Integrity of Open Source Software Using Digital Signature

    A group of programmers participate in the development of Open Source Software and its source code is publically made available for review, reporting, fixing bugs and enhancing its functionalities. The Open Source Software, its patches and new releases are made available to users through multiple hosts on the Internet and...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Performance Analysis of Semi-Supervised Intrusion Detection System

    Supervised learning algorithm for Intrusion Detection needs labeled data for training. Lots of data is available through internet, network and host. But this data is unlabeled data. The availability of labeled data needs human expertise which is costly. This is the main hurdle for developing supervised intrusion detection systems. The...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Performance Analysis of Supervised Approach for Pattern Based IDs

    Aim of an Intrusion Detection System (IDS) is to distinguish the behavior of network. IDS should upgrade itself so as to cope up with the changing pattern of attacks. Also detection rate should be high since attack rate on the network is very high. In response to this problem, Pattern...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2011

    Multimedia Based Steganography Using PMM and M4M

    In today's highly digitalized world maintaining the secrecy of the secret data is a vital problem. Steganography is an emerging area which may be used for secure transmission of the digital data. It is the art and science of embedding data into different covers such that the data embedded is...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    A Trust Based Security Scheme for RREQ Flooding Attack in MANET

    Mobile ad hoc are gaining popularity because of availability of low cost mobile devices and its ability to provide instant wireless networking capabilities where implementation of wired network is not possible or costly. MANETs are vulnerable to various types of attack because of its features like continuous changing topology, resource...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2011

    Hybrid Approach: Detection of Intrusion in Manet

    As the progression of networks is continues, Mobile Ad hoc NETwork (MANET) has become as a new frontier of technology to give anywhere, anytime communication. Because of the features like unreliability of wireless links between nodes, dynamic topology, limited battery power, lack of centralized control and others, the mobile ad...

    Provided By International Journal of Computer Applications