International Journal of Computer Science Engineering and Technology

Displaying 1-8 of 8 results

  • White Papers // May 2014

    Integration of Security Issues in Multi Cloud Computing Environment

    A proposed multi-cloud computing framework allows dynamic resource sharing among cloud-based system, addressing trust, policy, and privacy issues without pre-established collaboration agreement. Multi-cloud typically consists of service providers (or admin), infrastructure providers, and service users (or clients). Service provider (or admin) delivers applications as services to the service users (or...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    A Study on Data Sharing in the Cloud Using Distributed Accountability

    Cloud computing enables highly scalable services which to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    A Study on Frameworks of Privacy-Utility Tradeoffs in Databases

    Ensuring the usefulness of electronic data sources while providing necessary privacy guarantees is an important unsolved problem. This problem drives the need for an analytical framework that can quantify the privacy of personally identifiable information while still providing a quantifiable benefit (utility) to multiple legitimate information consumers. Online offerings such...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Mar 2013

    Detection of DDoS Attacks Using Source IP Based Entropy

    There are about nine hundred million people, who use internet now-a-days. They use the internet to communicate with each other and all over the world, business-men can do their work over the internet, and there is much more to it. One of the major security problems in the current Internet,...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jan 2012

    An Approach of Cryptography for Web User Authentication Using Secure Remote Password Protocol

    In this paper, the authors describe generation of a crypt key for user of web application using SRP techniques for the purpose of secure authentication in web. A numbers of web sites offer different kinds of users in worldwide to access web application using unique user name and corresponding a...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Aug 2011

    Simulation Based Performance Analysis of Ad Hoc Routing Protocols in Various Moving Trajectories

    Few characteristics of a Mobile Ad hoc Network, such as dynamic topology and shared wireless medium, pose various security challenges. This paper focuses on the performance investigation of reactive and proactive MANET routing protocols, namely, AODV and OLSR, under various the paths and trajectories. Network performance is evaluated in terms...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Aug 2011

    Improved Receiver-Based Algorithm for Resourceful Broadcasting in Portable ADHOC Networks

    Two efficient broadcasting algorithms based on 1- hop neighbor information is implemented here, i.e. Sender-based broadcasting algorithm and receiver-based broadcasting algorithm. The sender-based broadcasting algorithm selects a subset of nodes to forward the message. An efficient sender-based broadcasting algorithm proposed here is based on 1-hop neighbor information where the number...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Aug 2011

    Improve the Performance of LBAC-IAPP by Using Proactive Context Caching

    In wireless networks, continuous connectivity which allows user mobility and maintains the secured network utilization is one of the most important requirements. WLANS are widely used in business, governments, education and public. In order to establish wireless LAN with continuous connectivity, the authors need to employ additional mechanisms like IAPP,...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Aug 2011

    Simulation Based Performance Analysis of Ad Hoc Routing Protocols in Various Moving Trajectories

    Few characteristics of a Mobile Ad hoc Network, such as dynamic topology and shared wireless medium, pose various security challenges. This paper focuses on the performance investigation of reactive and proactive MANET routing protocols, namely, AODV and OLSR, under various the paths and trajectories. Network performance is evaluated in terms...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Aug 2011

    Improved Receiver-Based Algorithm for Resourceful Broadcasting in Portable ADHOC Networks

    Two efficient broadcasting algorithms based on 1- hop neighbor information is implemented here, i.e. Sender-based broadcasting algorithm and receiver-based broadcasting algorithm. The sender-based broadcasting algorithm selects a subset of nodes to forward the message. An efficient sender-based broadcasting algorithm proposed here is based on 1-hop neighbor information where the number...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jan 2012

    An Approach of Cryptography for Web User Authentication Using Secure Remote Password Protocol

    In this paper, the authors describe generation of a crypt key for user of web application using SRP techniques for the purpose of secure authentication in web. A numbers of web sites offer different kinds of users in worldwide to access web application using unique user name and corresponding a...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Mar 2013

    Detection of DDoS Attacks Using Source IP Based Entropy

    There are about nine hundred million people, who use internet now-a-days. They use the internet to communicate with each other and all over the world, business-men can do their work over the internet, and there is much more to it. One of the major security problems in the current Internet,...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    Integration of Security Issues in Multi Cloud Computing Environment

    A proposed multi-cloud computing framework allows dynamic resource sharing among cloud-based system, addressing trust, policy, and privacy issues without pre-established collaboration agreement. Multi-cloud typically consists of service providers (or admin), infrastructure providers, and service users (or clients). Service provider (or admin) delivers applications as services to the service users (or...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    A Study on Data Sharing in the Cloud Using Distributed Accountability

    Cloud computing enables highly scalable services which to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    A Study on Frameworks of Privacy-Utility Tradeoffs in Databases

    Ensuring the usefulness of electronic data sources while providing necessary privacy guarantees is an important unsolved problem. This problem drives the need for an analytical framework that can quantify the privacy of personally identifiable information while still providing a quantifiable benefit (utility) to multiple legitimate information consumers. Online offerings such...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Aug 2011

    Improve the Performance of LBAC-IAPP by Using Proactive Context Caching

    In wireless networks, continuous connectivity which allows user mobility and maintains the secured network utilization is one of the most important requirements. WLANS are widely used in business, governments, education and public. In order to establish wireless LAN with continuous connectivity, the authors need to employ additional mechanisms like IAPP,...

    Provided By International Journal of Computer Science Engineering and Technology