International Journal of Computer Science and Information Technologies

Displaying 1-40 of 646 results

  • White Papers // May 2014

    Categorize and Efficient: Top K Keyword Search of Spatial-Textual Data on the Road Network

    Spatio-textual information nowadays becomes so popular and mandatory for each searching application. Many organization have shown their concern regarding importance of using spatial information (\"Latitude\" & \"Longitude\") along with Textual data (i.e. Keyword Query \"Hospital\"). In parallel study, of searching trend and getting Top k result out of Spatio-Textual search...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2014

    Towards Secure Cloud Infrastructure with Cloud Validation

    Cloud computing is an emerging standard with various computing ideas and technologies for the Internet, supporting cost-effective organization applications and IT infrastructure. The acceptance of cloud computing demand is gradually increasing over the years and the development of the global market is regularly rising. Security is the major issue often...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2014

    Cloud Based Managed File Transfer Services

    In today's era there is a need for managed file transfer services over trivial one's mainly due to the outsourcing done in product lifecycle management and a need to get files from source to the destination (through a chain of people) in a faster, more reliable way. By making use...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2014

    TBDS- A New Data Security Algorithm in Cloud Computing

    Currently many organizations and companies are facing potential threats to their data management systems and these security concerns provide a basis to conduct research in this particular area. In this paper, the authors are proposing an algorithm comprising digital signature with auto generated token ID allotted by the cloud service...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2014

    Enhancing Security and Concurrency in Distributed Database with 6 Bit Encryption Algorithm

    Distributed database is the collection of data which are distributed on different network on different computer due to which the authors eliminate single site failure. Since in previous paper RSA is used widely to provide security but in this paper discussion is based on the NTRU. NTRU is superior security...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Enhancing Data Security by Adapting Network Security and Cryptographic Paradigms

    Network security is one of the significant aspects of information security. Network security is involved in various business organizations, enterprises, and other types of institutions and it has become a pivotal function in building and maintaining today's modern high-growth networks. Cryptography is a technology used to provide of information security...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Implementation of Enhanced Security on Vehicular Cloud Computing

    In a Vehicular Cloud (VC), underutilized vehicular resources including computing power, data storage, and internet connectivity can be shared between rented out over the Internet to various customers. If the VC concept is to see a wide adoption and to have significant societal impact, security and privacy issues need to...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Look Over on Mining Sequential Patterns in Evolving Data Stream

    Data Stream is sequence of digitally encoded coherent signals (packets of data or data packets) used to send or receive information that is in the process of being transmitted. It is a continuous, rapid and time-varying streams of data elements. A growing number of applications generate the streams of data....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    An Overview on Data Mining

    In this paper, the authors present an overview of research issues in data mining. They discuss mining with respect to web data referred here as web data mining. In particular, their focus is on web data mining research in context of their web data mining project called 'A study on...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Review of QoS Based Service Populating for Cloud Based Mobile Apps

    Popularity of mobile devices network technologies increases day by day. Mobile devices always maintain network connectivity by different network providers. So if user moves around then they can access cloud services without any disadvantages. In current model when user moves from one geographical area to another he will keep accessing...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    International Vulnerability Database Alliance as an Effective Vulnerability Disclosure Technique

    Vulnerability is one of the key factors that cause security incidents and has become a major international threat to network security. Vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability disclosure or the disclosure of a vulnerability is the revelation of a vulnerability to...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Live Devices: Insider Threat to Resources

    Gray Hat hackers/Insider can use Live Linux distribution to get into the resources of primary/secondary installed Operating system. By using such devices and distributions they can access the critical point of an Operating system which make them able to control User/Critical files that cannot be accessed within the operating system...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Cloud-Based Multimedia Storage System with QoS Provision

    Recently, there are new trends in the way the authors use computers and access networks due to advanced mobile devices and network technologies. One of trend is cloud computing where resources are stored and processed on network. The other is mobile computing, where mobile devices such as smart phones and...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Nymble:The Blocking System

    Unidentified systems permit users to get access to Internet services privately by utilising a series of routers to hide the client's IP address from the server. The achievement of such networks, although, has been restricted by users employing this anonymity for abusive purposes such as defacing well liked websites. Website...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Operating System Virtualization for Ubiquitous Computing

    The basic concept of virtualization is to provide the benefits of the services and components irrespective of its physical presence. Operating System (OS) virtualization describes the abstraction of an operating system from any underlying hardware architecture. OS virtualization is needed as it provides feature of transparent migration of applications. Ubiquitous...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Auditing Windows 7 Registry Keys to Track the Traces Left Out in Copying Files From System to External USB Device

    Today in the world of big data, information is critical and corporate professional firms are adopting the digital forensic technique for detecting the action timeline of the activities carried out. Digital forensics is an important subdivision of data and network security. With the increase in technology, attacks on data are...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Survey on Opinion Mining and Summarization of User Reviews on Web

    Large amount of user generated data is present on web as blogs, reviews tweets, comments etc. This data involve user's opinion, view, attitude, sentiment towards particular product, topic, event, news etc. Opinion mining (sentiment analysis) is a process of finding users' opinion from user-generated content. Opinion summarization is useful in...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    A Survey on Reducing Features to Improve Bug Prediction by Using Cos-Triage Algorithm

    Bugs are nothing but Software defects, present a serious challenge for system consistency and dependability. It is very difficult task to predict bugs. To detect the bugs from the software bug prediction is useful way. Machine learning classifiers have emerged newly as a way to envisage the existence of a...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Detection of Routing Misbehavior Nodes Using Improved 2-ACK in MANET'S (Simulation through NS-2)

    A MANET (Mobile Ad hoc NETwork) is a collection of individual mobile nodes which communicate with each other vis wireless link. In some cases the node which refuses to share its resources with the other for its own benefits are called selfish or misbehaving nodes. Because of these nodes in...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    A Review on Query Result Caching Using Dynamic Data Cache

    Backend database system is often the performance bottleneck when running applications. The need for speed is increasing rapidly so the authors must be able to handle large amount of data in small time units like seconds or even milliseconds. The main problem that affects this to be fulfilled is the...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    A Review on Optimization Technique in Server Virtualization

    In this paper, the earlier literature for resource optimization and virtualization has been presented. All the ideas that are developed have been understood and review has been presented for the same. Server virtualization is a key building block that enables application isolation, mobility, and partitioning of individual servers in the...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Implementation on Document Clustering using Correlation Preserving Indexing

    Document clustering is a technique for unsupervised document organization, automatic topic extraction and fast information recovery. In correlation preserving indexing, the documents are first assign into a low-dimensional semantic space. The documents with in the cluster are highly related to each other while the documents outside the cluster are dissimilar....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Accelerated Q-Learning Approach for Minutiae Extraction in Fingerprint Image

    Fingerprint recognition is a physiological biometric technique. It is most dependable as compare to other biometric technique. Fingerprint recognition involves preprocessing, minutiae extraction and post processing stages. In conventional approaches preprocessing stage include image processing steps to reduce noise. Image processing steps are extremely sensible against noise. A Q-learning approach...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Preserving Anonymity in Mixnet using AES Encryption Algorithm

    Data is one of the most important resources to organization and any loss or lack of access could lead to many problems, so the data should be transmitted with security. Although encryption was used to hide the contents of transmitted data, it does not hide the identity of the communicating...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    A Survey Paper on Performance of Routing Protocols in Wireless Ad-Hoc Network

    Mobile Ad-hoc NETwork (MANET) is an imperative technology in last decade. MANETs are highly vulnerable to attacks due to infrastructure less and decentralized network. This paper provides an outline of these protocols by presenting their individuality, functionality and their relative analysis to be evaluated the performance. This study experimentally compares...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Wireless Ad hoc Sensor Network for Depletion of Node Battery Life for Denial of Service

    Ad-hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. In this paper, the author have focused on resource depletion attacks at the routing protocol...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Review and Comparative Study of Clustering Techniques

    Clustering is an automatic learning technique which aims at grouping a set of objects into clusters so that objects in the same clusters should be similar as possible, whereas objects in one cluster should be as dissimilar as possible from objects in other clusters. Document clustering aims to group in...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Enhanced K-Means Clustering Algorithm to Reduce Time Complexity for Numeric Values

    Data mining is the process of using technology to identify patterns and prospects from large amount of information. In Data Mining, Clustering is an important research topic and wide range of unverified classification application. Clustering is technique which divides a data into meaningful groups. K-means clustering is a method of...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    An Efficient Guarding by Detecting Intrusions in Multi-Tier Web Applications

    Internet services and applications have become an inextricable part of daily life, enabling communication and the management of personal information from anywhere. To accommodate this increase in application and data complexity, web services have moved to a multitier design wherein the web server runs the application front-end logic and data...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Securing the Wireless Mesh Networks Against Epidemic Attack

    In recent years, Wireless Mesh Networks (WMNs) have emerged as a promising platform to provide easy Internet access. However, this increasing popularity of WMNs makes them an ideal target for different attacks. One such attack is the pollution attack/epidemic attack. Epidemic attack is a severe security problem in wireless mesh...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Association Rule Mining with Security Based on Playfair Cipher Technique

    Due to the vast increase in data in the present scenario, data mining tasks and methods are in usage. The security attacks are so common day-by-day over the web. Association Rule Mining (ARM) is one of the popular data mining methods that discover interesting correlations amongst a large collection of...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Intrusion Detection in Wireless Sensor Network Using Random Sensors by Implementing DES Algorithm

    Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this paper, the authors consider...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    A Novel Approach to Preserve the Privacy of Data

    A widely studied perturbation-based PPDM approach introduces random perturbation to individual values to conserve privacy before data are published. The data owner before publishing the data first perform changes to the data into n number of copies based on the access privilege and publishes. In that the high privilege data...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Role of Sensor Virtualization in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are widely used in many real life applications due its pool of operating advantages. Such networks are mainly used for the applications like health monitoring, industrial automation, smart home monitoring, military applications etc. These applications requires heterogeneous type of WSNs. The small scale WSNs can be...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Electronic Payment in Grocery Shop Using Passive RFID and Cloud Computing

    Radio Frequency IDentification (RFID) is a technology that uses radio waves to transfer data from an electronic tag which is also called as RFID tag or label attached to an object through a reader for the purpose of identifying and tracking the object. This paper focuses on an electronic payment...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Watermarking of Dataset Using Usability Constraints Model

    In the emerging field of \"Sharing dataset\" with the deliberate recipients, protecting ownership on the datasets is becoming a challenge in itself. Watermarking is the commonly used mechanism to enforce and prove ownership for the digital data in different formats like text, database, software, image, video, audio, image and relational...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Extraction of Query Interfaces for Domain-Specific Hidden Web Crawler

    Web databases are now permeative. Such a database can be retrieved via its query interface (only HTML query forms).Extracting HTML query forms is a major task in Deep Web. This task can be accomplished by two methods: positioned HTML forms on the web and recognizing domain-specific forms. For positioning query...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Graph Databases- An Overview

    For a long time, data has been typically stored in tabular form so as to increase the indexing and readability. Now-a-days, the trends are changing as graph databases are quickly gaining popularity. In fact, it would not be wrong to call them \"The future of DBMS\". The representation of data...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Comparison of Firewall and Intrusion Detection System

    Today firewalls have become the staple of network security architectures, primarily providing access control to network resources, and they have been successfully deployed in the large majority of networks like government organization and individual users. Firewall has many shortages, such as it cannot keep away interior attacks, it cannot provide...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Analysis of Security Techniques Applied in Database Outsourcing

    Database outsourcing is a nascent data management paradigm in which the data owner stores the confidential data at the third party service provider's site. The service provider is responsible for managing and administering the database and allows the data owner and clients to create, update, delete and access the database....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2012

    Manageable and Economical Connection of Centralized Repository Servers Using Server Ports

    Objective of centralized repository is to arrange an outsized number of server machines with little apparatus cost while providing high planning facility and bisection width. It is well understand that the present practice where servers are linked by a tree hierarchy of network switches cannot gather these necessities. In this...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2012

    Performance Analysis of Network Resources in Standard Access Protocols

    Wireless protocols resources and devices are constantly battery-powered, and hence expand the association lifetime and it is the primary concerns in the ubiquitous deployment of wireless networks. One approach is to efficiently utilize the limited energy supplies of the antenna is to have the access periodically putting resources to sleep...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2012

    Secure and Dependable Storage Services in Cloud Computing

    Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2013

    A Survey on Network Security Issues in Cloud Computing

    Cloud computing in a new technology the authors can use third party facilities and resources as a service to perform out computing needs. Cloud computing can offer a verity of services including hosted services over internet. Cloud computing is a model for enabling convenient on demand network access to a...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jun 2013

    Blacklisting Sites and Detecting Web Spams

    In this paper, the authors aim at blacklisting websites and detecting web spasm using IP Cloaking. Malicious spyware are causing a significant threat to desktop security and are playing with the integrity of the system. The misuse of websites to serve exploit code to compromise hosts on the Internet has...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2013

    Security Measures for Smart Devices Through Cryptography Using Cellular Automaton

    Present Embedded industry is emphasizing more on smart devices and they have gained much importance in daily life. The devices include communication, bio-medical, image processing, power, etc. While using smart devices (i-button technology) data acquisition and user authentication has to be done. Various security concepts are developed to suite these...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2013

    Alert Areas of Cloud Security

    Cloud computing has created much a boom over the past few years. Cloud computing basically serves an on-demand service and stores data of the client in segregated virtual locations. Cloud computing provides a multi customer virtual environment with cost according to the consumption resources by any client. Thus it is...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2013

    Foolproof Security for KeyStrokeBiometrics

    Now-a-days the authors are facing the majority of crimes related to security issues and these areas due to the leakage of passwords or illegal authentication. At one end, there is a continuous and tremendous improvement in the lifestyle of humans while at the other end; the technological crimes are increasing...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jun 2013

    Towards Novel and Efficient Architecture for Extended-RBAC in Cloud Computing

    Today cloud computing is very famous technology to share the number of resources. Security and privacy are the big issues in the cloud computing. It is open distributed environment so it is important to preserve the data as well as privacy of users. There is access control method in cloud...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2013

    Securing SMS Using Cryptography

    Short Message Service (SMS) is established as a widely used and wide spread approach for text messaging in present day's immensely mobile reliant world. Apart from electronic chatting, SMS today has become an accustomed source for communicating confidential or proprietary information. When this is the situation the imperative factor is...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jun 2013

    Secure Data Transmission Using Encrypted Secret Message

    In any communication, security is the most important issue in today's world. In steganography the authors have various techniques in different domains like spatial domain, frequency domain etc. to hide the message. It is very difficult to detect hidden message in frequency domain and for this domain they use various...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2013

    Authenticated Mutual Communication Between Two Nodes in MANETs

    In today's world, the people always try to be safe and protected when they communicate with others. But when Mobile Ad-hoc NETworks (MANETs) are considered, they are known to be unprotected due to the nature of message propagation and their openness. For data security the authors can use Symmetric key...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2013

    Elliptic Curve Diffie-Hellman Key Exchange Algorithm for Securing Hypertext Information on Wide Area Network

    The Elliptic Curve Cryptography (ECC) an emerging favorite because it requires less computational power, communication bandwidth, and memory when compared to other cryptosystems. In this paper, the authors present elliptic curve cryptography and Diffie-Hellman key agreement protocol, itself is an anonymous (non-authenticated) key-agreement protocol, it provides the basis for a...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Oct 2013

    A Survey on Security Threats and Vulnerability Attacks on Bluetooth Communication

    In this paper, the authors present a survey on threats and vulnerability attacks on Bluetooth security mechanism. Bluetooth is the Personal Area Network (PAN). It is the kind of wireless ad hoc network. Low cost, low power, low complexity and robustness are the basic features of Bluetooth. It works on...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Oct 2013

    Survey on Security Issues and Problems in Cloud Computing Virtual Machines

    Cloud computing depends heavily on virtualization. Virtualization technology has developed promptly because of the rapid decrease in hardware cost and increase in hardware computing power. A hypervisor between the hardware and the OS enables multiple virtual machines to run on top of a single physical machine. The hypervisor diaries and...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2013

    Enhancing Kerberos Security Using Public Key and Context-Aware Access Control

    Authentication is a first phase in standard Kerberos which is password dependent. It makes the protocol vulnerable from attackers for password hacking using offline or online attacks. In this paper, the authors have proposed password-less authentication which is based on public-key that gives increase security but at the same time...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2013

    Protection of Data Base Security via Collaborative Inference Detection

    Throughout companies, government departments, and doctors' offices, database systems are used. This particular system stores and retrieves sensitive information such as social security numbers, financial statements, and highly classified data. Organizations with sensitive data in their hands need to be secured using different security techniques and policies. In order to...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Oct 2013

    Watchdog Three-Tier Technique to Secure Wireless Sensor Network

    In many Wireless Sensor Network (WSN) the Mobile Sinks (MSs) are very essential applications for efficient data gathering, restricted sensor reprogramming, and for distinguishing and revoking compromised sensors. This paper describes a watchdog three-tier general framework that permits the use of any pair wise key pre-distribution scheme as its basic...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Sep 2013

    A Novel Approach for Secured Communication in WSN Using Dynamic Low-Weight Keys

    A Wireless Sensor Network (WSN) is formed by one or more base stations and a large number of sensor nodes to monitor the objects of interest or environmental conditions such as sound, temperature, light intensity, humidity, pressure, motion and so on through wireless communications. This paper presents, a secure routing...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jun 2013

    The Prototype for the Unification of Various Cryptographic Modules: A Solution to the Information Security

    In this paper, the authors have proposed the concept for the unification of various cryptographic modules. By applying this concept, the software engineers can develop an application which can perform both the encryption and decryption of various types of files. They have chosen java as the base of their study....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Oct 2013

    Self-Organized Efficient Authentication and Key Management Scheme for Multihop Relay Networks

    Wireless internet services are quickly intensifying and improving, it is significant to provide users with not only high speed and high quality wireless service but also secured. Multi-hop relay-based support was added, which not only help for improving coverage and throughput but also provides features such as lower backhaul deployment...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2013

    Securing Files Using AES Algorithm

    Now-a-days information systems play a vital role for organizations and individuals, in which the security is given the high priority. Often, solutions are developed for very similar problems over and over again. In this paper, the files are encrypted and stored in the disk by using a secret key and...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Sep 2013

    Ensuring Correctness and Error Localisation in Cloud

    Cloud computing has been envisioned as the next generation architecture of it enterprise. In contrast to traditional solutions, where the it services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Oct 2013

    Enhancement of Single to Inter-Clouds in Cloud Computing

    Cloud computing promises to significantly change the way the authors use computers and access and store their personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2013

    New Approach for Data Encryption Using Two Way Crossover

    The network security and data encryption is very important at present day. So for the data transmission in open network, the authors need to protect data transmission confidently from sender to recipient. In an open network for the transmission of any file like text file, binary file or any other...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2013

    Intelligent Approach Toward Anti-Phishing Using Two Factor Authentication

    Phishing is an attempt to commit fraud via social engineering. The impact is the breach of information security through the compromise of confidential data. Customers can access their banking accounts from anywhere in the world using their login ID and password. However, the use of password does not provide adequate...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2013

    An Extended Zigbee Wireless Vehicular Identification and Authentication System

    In this paper, the authors explain about the prototype development of the proposed system and it presents hardware and firmware aspects of the design. A vehicle identification device profile was defined and developed using the Microchip Zigbee protocol stack. Hardware implementation of Zigbee RF tags, reader and writer was carried...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Oct 2013

    Lightweight Hope Supervision of Wireless Body Sensor Network

    Wireless Body Sensor Networks (WBSNs) enable ubiquitous health monitoring of users during their everyday lives, at health sites, without restricting their freedom. This issue is often ignored in existing trust systems. The authors identify the security and performance challenges facing a sensor network for wireless medical monitoring and suggest it...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2013

    Intrusion Detection System- Types and Prevention

    Intrusion detection is the act of detecting unwanted traffic on a network or a device. An IDS can be a piece of installed software or a physical appliance that monitors network traffic in order to detect unwanted activity and events such as illegal and malicious traffic, traffic that violates security...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2013

    Survey on Different Types of Attacks and Counter Measures in Wireless Networks

    Communications in wireless networks has been facilitating numerous emerging applications that require packet delivery from one or more senders to multiple receivers. Communications are sensitive to various kinds of attacks due to insecure wireless channels. Communications in wireless networks remains a challenging and Internal or external issues. In this paper,...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2013

    Domain Name System: The Backbone of Today's World of Internet

    Domain Name System is an Internet service that translates domain names into IP addresses because domain names are alphabetic, they are easier to remember. However the Internet is really based on IP addresses. Therefore every time the authors use a domain name, a DNS service must translate the name into...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2013

    Importance of Aho-Corasick String Matching Algorithm in Real World Applications

    String matching problem is to find all the occurrences of a given string pattern in a large string text. This problem is fundamental in computer science and is the basic need of many applications, one of the most popular multi-pattern string matching algorithm is \"Aho-corasick\"; based on constructing DFA (Deterministic...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2013

    Effective Cloud Service Management Through Volunteer Computing

    Cloud computing delivers the computing resources to the user as a service over an internet. It uses wireless services with a user's data, software and computation. So spreader over almost all IT sector and become a rich area of research. Cloud computing composes of virtualization, on demand deployment. Here user...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2013

    Authenticating Voice Communication with Barcode as the Watermark

    Voice signal authentication of each communication is of extreme importance in today's information-based society, individual as well as the fields of government, forensics, military, financial, legal, diplomacy, corporation and medicine, the information have to be authenticated to avoid the unauthorized or illegal behavior and to prevent the misuses. Authenticating each...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2013

    Evaluation and Mitigation of DoS Attack Using Behavior Anomaly Detection Approach Using NS-3

    Everything has two sides, pros and cons. Mobile ad-hoc offers instant solution for communication when requires without establishing infrastructure with wireless mobility feature. MANET is a kind of automatic networks which composed of flexible, dynamic, and fully autonomous network entities that can (re)systematize in accordance with the operational, cost-effective, and...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2013

    An Efficient Password Based Two-Server Authentication and Pre-Shared Key Exchange System Using Smart Cards

    Password Authenticated Key Exchange (PAKE) protocols enable two entities to agree on a common session key based on a pre-shared human memorable password. The main security goal of these protocols is providing security against password guessing attacks. The researchers' proposed advanced smart card based password authentication protocol with such non-tamper...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2013

    Human Digitization: Authentication Profiles in Digital Information Rights Management Systems

    In this paper, the author emphasizes a new layer to information rights management as it applies to security, privacy and confidentiality of field level data elements. In the interconnected economy, consumers and corporations develop an electronic relationship where commercial and online applications provide convenient access to account data. As consumer...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2013

    A Survey on Packet Marking and Logging

    A hybrid model of packet marking and logging for the IP trace back for the node that wants to attack any node in the network. The main idea is to detect the DOS attacks in the network by employing the IP of the attacker node. Packet logging scheme used to...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2013

    A Review of Packet Filtering Problem in MANET

    The wireless Ad hoc network is the self configuring type of network. In self configuring type of networks mobile nodes can leave or join the network when they want. In such type of networks many inside and outside attacks are possible. Inside and outside attacks are broadly classified as active...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2013

    Unobtrusive Technique for the Detection of Data Seepage

    Data leakage is a budding security threat to organizations, particularly when data leakage is carried out by trusted agents. In this paper, the authors present unobtrusive techniques for detecting data leakage and assessing the \"Guilt\" of agents. Water marking is the long-established technique used for data leakage detection which involves...

    Provided By International Journal of Computer Science and Information Technologies