International Journal of Computer Science and Information Technologies

Displaying 1-40 of 663 results

  • White Papers // Jul 2014

    Comparative Analysis of Encrypted Video Streaming in Cloud Network

    Digital data is readily available in the form of pictures, videos, and over the internet. Therefore, the significance of increasing digital contents demands new challenges to ensure the distribution of the digital content. This dissertation addresses various encryption techniques for videos while streaming them in cloud environment. In these encryption...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Virtual Machine Placement Based on Disk I/O Load in Cloud

    In cloud virtualization allows to consolidate the services onto a lesser number of physical servers than originally required. The virtual machine is one of the most commonly used resource carriers in which business services are encapsulated. Virtual machine placement optimization, i.e., finding optimal placement schemes for virtual machines, and reconfigurations...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Secure Cloud - A Survey

    Cloud computing is an emerging technology where the data is outsourced to the cloud. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel control, cloud moves the application software and databases to the large data centers, where the management of the data and...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Energy Economical Resolution for Heavy Computation Using Cloud

    In spite of the dramatic growth inside the variability of excellent phones in recent years, the challenge of restricted energy capability of these devices has not been resolved satisfactorily. However, inside the age of cloud computing, the limitation on energy capability is mitigated off in a cheap manner by offloading...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    A Study of the Issues and Security of Cloud Computing

    In this paper, the authors identify the issues and the solution to overcome these problems. Cloud computing is a subscription based service where they can obtain networked storage space and computer resources. This technology has the capacity to admittance a common collection of resources on request. It is the application...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Propagate Cooperative Caching on MANETS

    Mobile Ad-hoc NETworks (MANET) are formed by mobile devices, such as data enabled phones, electronic book readers. Generally users can share common interests in electronic interests in electronic content. As MANET become more and more crucial to everyday functioning of the people. This paper discusses cooperative caching technique for minimizing...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    A Survey on Data Sharing Using Encryption Technique in Cloud Computing

    A model by which information technology services being delivered is resources are retrieved from the internet through web-based tools and applications, instead of direct connection to a server. The data and software packages are stored in servers. However, cloud computing structure allows access to information as long as an electronic...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Privacy Preservation of Published Data through Record Elimination by Anonymizied Approach

    Data mining is the process of analyzing data. Data privacy is collection of data and dissemination of data. Privacy issues arise in different area such as health care, intellectual property, biological data, financial transaction etc. It is very difficult to protect the data when there is transfer of data. Sensitive...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Missing Value Imputation in Multi Attribute Data Set

    Data mining has made a great progress in recent year but the problem of missing data or value has remained great challenge for data mining. Missing data or value in a datasets can affect the performance of classifier which leads to difficulty of extracting useful information from datasets dataset taken...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    An Efficient Software Prediction on Cloud infrastructure With Self- Adaptive Classification Model

    Business information is stored in the cloud environment and offers proficient software services to the clients using internet. Cloud infrastructure delivers traditional software services among different cloud users. Decentralized self-adaptation mechanism has been implemented to maintain decentralization applicable to QoS exhibited cloud system. However, designing decentralized self-adaptation mechanism is not...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Survey on Data Mining with Privacy Preservation

    Data mining is the process to look for hidden patterns and trends in data that is not immediately apparent from summarizing the data. Due to the rapid development in technology, it needs updated techniques to provide privacy for data mining. There are various methods and techniques which have been created...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Segmentation of Mobile Customers for Improving Profitability Using Data Mining Techniques

    In this paper, the authors help in identifying the activities segmentation of mobile customers of different groups will be done based on some rules. Customers are segregated into groups under the categorization of network providers. There are different types of networks, but they used only four types of networks. These...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Storing, Querying and Validating Fuzzy XML Data in Relational Database

    Information ambiguity and uncertainty are the major issues in real real-world scenario and for resolving these issues fuzzy data management has been incorporated in different database management systems in different ways. Even though there is much literature on XML-to-relational storage, few of these have given satisfactory solutions to the given...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Studies on Clustering and Fuzzy Clustering

    In recent years, data mining is widely preferred area by researcher for discovering new knowledge and it has various concepts in that. The clustering is most popular concept in data mining and getting new knowledge from hidden data structure. Databases having lot of meaningful information and stored in unordered as...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Defend Data using ELGAMAL Digital Signature Data Decryption Algorithm

    Data security and encryption are now-a-days playing major role in Information Technology (IT) sector. Security problem generated creates exertion to the firm. They are several digital signature algorithms which are useful in providing security for the issues generated. Elgamal Digital Signature (EDS) algorithm which is used in wide applications had...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Cloud Computing: Designing Different System Architecture Depending On Real-World Examples

    The authors decided to focus on the categorization of cloud architectures by looking at the deployment and service models used to describe cloud computing. Researching which architectures are available is hard to do because cloud computing offerings are emerging at a rapid pace. It is not only hard to keep...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jun 2014

    Design and Verification of USB 3.0 Link Layer (LTSSM)

    USB is an industry standard developed in the mid-1990s, it defines the cables, connectors and protocols used in a bus for connection and communication between computers and electronic devices. In this proposed design it mainly includes USB 3.0, LTSSM. The Link Training and Status State Machine (LTSSM) have downstream and...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2014

    Categorize and Efficient: Top K Keyword Search of Spatial-Textual Data on the Road Network

    Spatio-textual information nowadays becomes so popular and mandatory for each searching application. Many organization have shown their concern regarding importance of using spatial information (\"Latitude\" & \"Longitude\") along with Textual data (i.e. Keyword Query \"Hospital\"). In parallel study, of searching trend and getting Top k result out of Spatio-Textual search...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2014

    Towards Secure Cloud Infrastructure with Cloud Validation

    Cloud computing is an emerging standard with various computing ideas and technologies for the Internet, supporting cost-effective organization applications and IT infrastructure. The acceptance of cloud computing demand is gradually increasing over the years and the development of the global market is regularly rising. Security is the major issue often...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2014

    Cloud Based Managed File Transfer Services

    In today's era there is a need for managed file transfer services over trivial one's mainly due to the outsourcing done in product lifecycle management and a need to get files from source to the destination (through a chain of people) in a faster, more reliable way. By making use...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2014

    TBDS- A New Data Security Algorithm in Cloud Computing

    Currently many organizations and companies are facing potential threats to their data management systems and these security concerns provide a basis to conduct research in this particular area. In this paper, the authors are proposing an algorithm comprising digital signature with auto generated token ID allotted by the cloud service...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2014

    Enhancing Security and Concurrency in Distributed Database with 6 Bit Encryption Algorithm

    Distributed database is the collection of data which are distributed on different network on different computer due to which the authors eliminate single site failure. Since in previous paper RSA is used widely to provide security but in this paper discussion is based on the NTRU. NTRU is superior security...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Enhancing Data Security by Adapting Network Security and Cryptographic Paradigms

    Network security is one of the significant aspects of information security. Network security is involved in various business organizations, enterprises, and other types of institutions and it has become a pivotal function in building and maintaining today's modern high-growth networks. Cryptography is a technology used to provide of information security...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Implementation of Enhanced Security on Vehicular Cloud Computing

    In a Vehicular Cloud (VC), underutilized vehicular resources including computing power, data storage, and internet connectivity can be shared between rented out over the Internet to various customers. If the VC concept is to see a wide adoption and to have significant societal impact, security and privacy issues need to...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Look Over on Mining Sequential Patterns in Evolving Data Stream

    Data Stream is sequence of digitally encoded coherent signals (packets of data or data packets) used to send or receive information that is in the process of being transmitted. It is a continuous, rapid and time-varying streams of data elements. A growing number of applications generate the streams of data....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    An Overview on Data Mining

    In this paper, the authors present an overview of research issues in data mining. They discuss mining with respect to web data referred here as web data mining. In particular, their focus is on web data mining research in context of their web data mining project called 'A study on...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Review of QoS Based Service Populating for Cloud Based Mobile Apps

    Popularity of mobile devices network technologies increases day by day. Mobile devices always maintain network connectivity by different network providers. So if user moves around then they can access cloud services without any disadvantages. In current model when user moves from one geographical area to another he will keep accessing...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    International Vulnerability Database Alliance as an Effective Vulnerability Disclosure Technique

    Vulnerability is one of the key factors that cause security incidents and has become a major international threat to network security. Vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability disclosure or the disclosure of a vulnerability is the revelation of a vulnerability to...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Live Devices: Insider Threat to Resources

    Gray Hat hackers/Insider can use Live Linux distribution to get into the resources of primary/secondary installed Operating system. By using such devices and distributions they can access the critical point of an Operating system which make them able to control User/Critical files that cannot be accessed within the operating system...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Cloud-Based Multimedia Storage System with QoS Provision

    Recently, there are new trends in the way the authors use computers and access networks due to advanced mobile devices and network technologies. One of trend is cloud computing where resources are stored and processed on network. The other is mobile computing, where mobile devices such as smart phones and...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Nymble:The Blocking System

    Unidentified systems permit users to get access to Internet services privately by utilising a series of routers to hide the client's IP address from the server. The achievement of such networks, although, has been restricted by users employing this anonymity for abusive purposes such as defacing well liked websites. Website...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Operating System Virtualization for Ubiquitous Computing

    The basic concept of virtualization is to provide the benefits of the services and components irrespective of its physical presence. Operating System (OS) virtualization describes the abstraction of an operating system from any underlying hardware architecture. OS virtualization is needed as it provides feature of transparent migration of applications. Ubiquitous...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Auditing Windows 7 Registry Keys to Track the Traces Left Out in Copying Files From System to External USB Device

    Today in the world of big data, information is critical and corporate professional firms are adopting the digital forensic technique for detecting the action timeline of the activities carried out. Digital forensics is an important subdivision of data and network security. With the increase in technology, attacks on data are...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Survey on Opinion Mining and Summarization of User Reviews on Web

    Large amount of user generated data is present on web as blogs, reviews tweets, comments etc. This data involve user's opinion, view, attitude, sentiment towards particular product, topic, event, news etc. Opinion mining (sentiment analysis) is a process of finding users' opinion from user-generated content. Opinion summarization is useful in...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    A Survey on Reducing Features to Improve Bug Prediction by Using Cos-Triage Algorithm

    Bugs are nothing but Software defects, present a serious challenge for system consistency and dependability. It is very difficult task to predict bugs. To detect the bugs from the software bug prediction is useful way. Machine learning classifiers have emerged newly as a way to envisage the existence of a...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Detection of Routing Misbehavior Nodes Using Improved 2-ACK in MANET'S (Simulation through NS-2)

    A MANET (Mobile Ad hoc NETwork) is a collection of individual mobile nodes which communicate with each other vis wireless link. In some cases the node which refuses to share its resources with the other for its own benefits are called selfish or misbehaving nodes. Because of these nodes in...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    A Review on Query Result Caching Using Dynamic Data Cache

    Backend database system is often the performance bottleneck when running applications. The need for speed is increasing rapidly so the authors must be able to handle large amount of data in small time units like seconds or even milliseconds. The main problem that affects this to be fulfilled is the...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    A Review on Optimization Technique in Server Virtualization

    In this paper, the earlier literature for resource optimization and virtualization has been presented. All the ideas that are developed have been understood and review has been presented for the same. Server virtualization is a key building block that enables application isolation, mobility, and partitioning of individual servers in the...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Implementation on Document Clustering using Correlation Preserving Indexing

    Document clustering is a technique for unsupervised document organization, automatic topic extraction and fast information recovery. In correlation preserving indexing, the documents are first assign into a low-dimensional semantic space. The documents with in the cluster are highly related to each other while the documents outside the cluster are dissimilar....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Accelerated Q-Learning Approach for Minutiae Extraction in Fingerprint Image

    Fingerprint recognition is a physiological biometric technique. It is most dependable as compare to other biometric technique. Fingerprint recognition involves preprocessing, minutiae extraction and post processing stages. In conventional approaches preprocessing stage include image processing steps to reduce noise. Image processing steps are extremely sensible against noise. A Q-learning approach...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2013

    A Review of Packet Filtering Problem in MANET

    The wireless Ad hoc network is the self configuring type of network. In self configuring type of networks mobile nodes can leave or join the network when they want. In such type of networks many inside and outside attacks are possible. Inside and outside attacks are broadly classified as active...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2013

    Unobtrusive Technique for the Detection of Data Seepage

    Data leakage is a budding security threat to organizations, particularly when data leakage is carried out by trusted agents. In this paper, the authors present unobtrusive techniques for detecting data leakage and assessing the \"Guilt\" of agents. Water marking is the long-established technique used for data leakage detection which involves...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2013

    Moving to the Media Cloud for Data and Content Integration Management

    The amount of information available to a person is growing day-by-day; hence retrieving the correct information in a timely manner plays a very important role. This paper talks about indexing document collections and fetching the right information with the help of cloud computing platforms. This paper is an attempt at...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2013

    Advanced Network Intrusion Detection System Based on Effective Feature Selection

    The growing rate of network attacks including hacker, cracker, and criminal enterprises have been increasing, which impact to the availability, confidentiality, and integrity of critical information data. Intrusion detection system has become a necessary addition to security infrastructure of most Organizations. Intrusion Detection Systems (IDS) take either network or host...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Oct 2013

    Proliferation of Worm Infection in P2P Networks and its Prohibition

    Malicious software or malware is the software developed with malicious intentions. Hackers use it for spoiling computer programs or to get access to sensitive information. The detection of such malware can be done by writing program which can understand the dynamics of malware. In this paper, the authors presents an...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2013

    An Efficient ID3 Decision Tree for the Classification of Populated IP Address Using K-Mean Clustering

    In this paper, the authors addresses estimating the number of the users of a specific application behind IP address (IPs). This problem is central to combating abusive traffic, such as DDoS attacks, ad click fraud and email spam, scams, phishing, and malware distribution. Here they proposed an efficient method to...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2013

    Cloud Computing in Mobile Networks with Middleware Technology

    The web services are of a vital role in the domain of mobile networks for their utility in various applications of communications field. However, there are more challenging issues of functionalities of mobile technology with the current web based resources. This paper deals with architectural implementation methodologies of the mobile...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2013

    Analysis of Variants in Round Robin Algorithms for Load Balancing in Cloud Computing

    Cloud computing is the emerging internet based technology which emphasizes commercial computing. Cloud is a platform providing dynamic pool resources and virtualization. Based on a pay-as-you-go model, it enables hosting of pervasive applications from consumer, scientific, and business domains. To properly manage the resources of the service provider, load balancing...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2012

    Application Level Security in Cloud Computing

    Cloud computing represents a new computing model that poses many demanding security issues at all levels, e.g., network, host, application, and data levels. The variety of the delivery models presents different security challenges depending on the model and consumers' Quality of Service (QoS) requirements. Confidentiality, integrity, availability, authenticity, and privacy...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2012

    Enhancing Security in Software Development Life Cycle

    Computer system facing security attack. To handle proper security in a software the authors must consider the security requirements early in the software development life cycle. In this decade there are various techniques exist for proper security requirements during the early phases of Software Development Life Cycle (SDLC) there are....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2012

    Security Provision in Publicly Auditable Secure Cloud Data Storage Services Using SHA-1 Algorithm

    Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility over a network. Cloud computing entrusts services with a user's data, software and computation on a published application programming interface...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Security of Data Dynamics in Cloud Computing

    Cloud computing refers to the many different types of services and applications being delivered in the internet cloud, and the fact that, in many cases, the devices used to access these services and applications do not require any special applications. Cloud computing has been moves the application software and databases...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Sep 2011

    A Framework on Database Content Security Using Negative Databases

    In today's information warfare providing data security to web based databases is a critical issue. Existing techniques to protect database content are not sufficient to extend for web based databases. Hence, there is a huge requirement for developing algorithms, which deals with data protection against intruders. Developing negative databases will...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Secure Mobile Agent Based IDS for MANET

    Mobile agents are used to share the utility to collect information from various nodes. The authors have given consideration to the security of mobile agents. This paper proposes an algorithm which is based on dummy agent. In this paper, they are proposing a secured mechanism to manage the security of...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Sep 2011

    Secure Dynamic Routing Using DDRA

    Security has become one of the major issues for data communication over wired and wireless networks. Different from the past work on the designs of cryptography algorithms and system infrastructures, the authors will propose a dynamic routing algorithm that could randomize delivery paths for data transmission. The algorithm is easy...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Oct 2012

    Computer & Network Security

    In modern world, the people entire life moves around computers. most of their tasks are dependent on the computers, like communication, ticket reservations, researches, printing, education, etc. When the authors communicate with each other by using computers through e-mails, a number of computers are used for this purpose and the...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Sep 2012

    A Novel Approach for Multi-Cloud Storage security in Cloud Computing

    In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Now, recession-hit companies are increasingly realizing that simply by tapping into the cloud they can gain fast access to best-of-breed business applications or drastically...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2012

    Monitoring & Security by Mobile Snapshot Spy

    Now-a-day's CCTV cameras are used to monitor activities. In offices some employees neglect their schedule work and are busy gossiping & in other activities etc. Company's manager is not available all time in office therefore due to some employee's firm faces some amount of loss. This paper will implement capturing...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Sep 2011

    Implementation of High Security in MANET Using Combined IDS and Finger Print Authentication with Data Fusion

    In this paper, the authors are attempt to study and implement high security in Mobile Ad-hoc NETworks (MANETs) using Multi-modal biometric technology and by using Dempster-Shafer theory for data fusion. MANETs supporting security sensitive applications in hostile environments needs to be continuously monitored for unauthorized use. In such cases, continuous...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Sep 2012

    Authenticated Transmission Using Quantum Security

    Now-a-day's security of network transmission became a vital aspect, because the major security risks occur while conducting business on the net; the following are some of the security risks occur: unauthorized-access, eavesdropping, password sniffing, denial of service, data modification, repudiation. One of the methods to secure the information is cryptography....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2012

    Cloud Security with Encryption Using Hybrid Algorithm and Secured Endpoints

    Cloud providers generally states that they are not responsible for the security that means leakage of the subscribed data or unauthorized modification of the data to make secure key for the purpose of securing cloud for transactions. It would have a private cloud for highly secure transactions and it would...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2012

    A Prototype for Secure Web Access Model Using Multimodal Biometric System Based on Fingerprint and Face Recognition

    Any automatically measurable, robust and distinctive physical characteristics or personal trait that can be used to identify an individual or verify the claimed identity of an individual, referred to as biometrics, has gained significant interest in the wake of heightened concerns about security and rapid advancements in networking, communication and...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Oct 2012

    CEBKST: The Cost Efficient Based on Keying and Secure Data Transmission for Wireless Sensor Network

    In this paper, the author deals with Designing secure network protocols and cost-efficient, for Wireless Sensor Networks (WSNs). It is a problem because sensors are resource-limited wireless devices. Since the communication cost is the most dominant factor in a sensor's energy consumption, Here, they introduce a Cost Efficient Based on...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2012

    AES Security Enhancement by Using Double S-Box

    In the world of cryptography Advanced Encryption Standard (AES) is one of the best algorithms of symmetric encryption technology. In this paper, the authors deal with improving security against attack. The randomness of the S-box is increase the avalanche effect and also increase the immunity power against attack compare to...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2012

    Proposed a Robust Trust Model for Reliable and Secure Transactions in Grid Computing

    Grid computing is a type of advanced computing system whereby resources are shared from different domains. Organizations will only adopt this technology if they are assured of their data privacy, consistency & integrity. In such a scenario, reliability plays a critical role. Reliability in Grids can be enhanced by both...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Oct 2012

    Secure Analysis for Interval-Based Algorithms

    The authors consider several distributed collaborative key agreement and authentication protocols for dynamic peer groups. There are several important characteristics which make this problem different from traditional secure group communication. They are: distributed nature in which there is no centralized key server; collaborative nature in which the group key is...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Sep 2012

    A Secure Data Hiding Technique in Compressed Video Using a Secret Key

    In this paper, the authors deal with data hiding in compressed video. Unlike data hiding in images and raw video which operates on the images themselves in the spatial or transformed domain which are vulnerable to steganalysis, they target the motion vectors used to encode and reconstruct both the forward...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Aug 2012

    A Navel Approach to Identify Geo-Encryption with GPS and Different Parameters (Locations and Time)

    The authors are moving towards an era where location information will be necessary for access control. The use of location information can be used for enhancing the security of an application. Geo-encryption is the use of Position naVigation and Time (PVT) information as means to enhance the security of a...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2012

    GSM Based LAN Monitoring System

    In this paper, the authors demonstrate a method which enables users to control their LAN network from remote place using a cell phone-based interface. To manage and monitor the control activities of network, the user should send an authentication SMS along with the required/desired function/action SMS to the user server...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Sep 2011

    Hybrid Broadcast Routing with Dynamic Security Considerations

    An ad hoc network is the supportive engagement of a collection of mobile nodes without the required interference of any centralized access point or existing infrastructure. There is an increasing trend to adopt ad hoc networking for profitable uses; however, their main applications lie down in military, strategic and other...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2012

    Manageable and Economical Connection of Centralized Repository Servers Using Server Ports

    Objective of centralized repository is to arrange an outsized number of server machines with little apparatus cost while providing high planning facility and bisection width. It is well understand that the present practice where servers are linked by a tree hierarchy of network switches cannot gather these necessities. In this...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2012

    Performance Analysis of Network Resources in Standard Access Protocols

    Wireless protocols resources and devices are constantly battery-powered, and hence expand the association lifetime and it is the primary concerns in the ubiquitous deployment of wireless networks. One approach is to efficiently utilize the limited energy supplies of the antenna is to have the access periodically putting resources to sleep...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2012

    Secure and Dependable Storage Services in Cloud Computing

    Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2013

    A Survey on Network Security Issues in Cloud Computing

    Cloud computing in a new technology the authors can use third party facilities and resources as a service to perform out computing needs. Cloud computing can offer a verity of services including hosted services over internet. Cloud computing is a model for enabling convenient on demand network access to a...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jun 2013

    Blacklisting Sites and Detecting Web Spams

    In this paper, the authors aim at blacklisting websites and detecting web spasm using IP Cloaking. Malicious spyware are causing a significant threat to desktop security and are playing with the integrity of the system. The misuse of websites to serve exploit code to compromise hosts on the Internet has...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2013

    Security Measures for Smart Devices Through Cryptography Using Cellular Automaton

    Present Embedded industry is emphasizing more on smart devices and they have gained much importance in daily life. The devices include communication, bio-medical, image processing, power, etc. While using smart devices (i-button technology) data acquisition and user authentication has to be done. Various security concepts are developed to suite these...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2013

    Alert Areas of Cloud Security

    Cloud computing has created much a boom over the past few years. Cloud computing basically serves an on-demand service and stores data of the client in segregated virtual locations. Cloud computing provides a multi customer virtual environment with cost according to the consumption resources by any client. Thus it is...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2013

    Foolproof Security for KeyStrokeBiometrics

    Now-a-days the authors are facing the majority of crimes related to security issues and these areas due to the leakage of passwords or illegal authentication. At one end, there is a continuous and tremendous improvement in the lifestyle of humans while at the other end; the technological crimes are increasing...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2013

    Intrusion Detection System- Types and Prevention

    Intrusion detection is the act of detecting unwanted traffic on a network or a device. An IDS can be a piece of installed software or a physical appliance that monitors network traffic in order to detect unwanted activity and events such as illegal and malicious traffic, traffic that violates security...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2013

    Survey on Different Types of Attacks and Counter Measures in Wireless Networks

    Communications in wireless networks has been facilitating numerous emerging applications that require packet delivery from one or more senders to multiple receivers. Communications are sensitive to various kinds of attacks due to insecure wireless channels. Communications in wireless networks remains a challenging and Internal or external issues. In this paper,...

    Provided By International Journal of Computer Science and Information Technologies