International Journal of Reviews in Computing

Displaying 1-36 of 36 results

  • White Papers // Nov 2013

    A Double Guard Hill Cipher Suitable for Wireless Sensor Networks

    A Classical Hill cipher breaks the plaintext into blocks and multiplies each block to a key matrix to obtain the cipher text. But it inclines to known plaintext. To strength the Hill cipher, a novel modification is performed in this paper. A double protection has been given for the Hill...

    Provided By International Journal of Reviews in Computing

  • White Papers // Nov 2013

    The Relationship of Information Security Knowledge (ISK) and Human Factors: Challenges and Solution

    Information, knowledge, and information security are indispensable in an organisation to ensure the effectiveness of an organisation. An organisation needs people who have adequate information and knowledge to run a business. Lack of knowledge especially in information security may jeopardise the organisation such as the increase of internal security incidents....

    Provided By International Journal of Reviews in Computing

  • White Papers // Oct 2013

    A New Database Integration Model Using an Ontology-Driven Mediated Warehousing Approach

    Database integration technology has been developed for more than 20 years. The difficulties of database integration are the integration of heterogeneous data sources, with respect to the schemas and their data, as well as the query processing time that can take longer than expected. In this paper, the authors present...

    Provided By International Journal of Reviews in Computing

  • White Papers // Dec 2012

    Wireless Sensor Networks Loclaization Algorithms: A Comparative Study

    Wireless Sensor Networks (WSNs) are the type of networks that are currently used in many applications. Some of these applications are critical and their information is very sensitive e.g. battle field and health care monitoring. Any transferred data has to be known from where it comes. In other words, most...

    Provided By International Journal of Reviews in Computing

  • White Papers // Dec 2012

    Analysis of Mobile Agent Systems Performance Using Linear Prediction Model

    Mobile Agents are considered an interesting technology to develop applications for distributed systems. Thus they present features, such as autonomy and capability to roam to hosts, process data, and save remote communications. Many mobile agent platforms have been developed for research purposes while other platforms have been deployed as commercial...

    Provided By International Journal of Reviews in Computing

  • White Papers // Dec 2012

    Studying the Effects of Malicious Nodes Using Geographic Routing Protocol in the WSN

    In this paper, studying the effect of malicious nodes in the Wireless Sensor Networks (WSNs) is proposed. The low-cost, low data rate of the sensor nodes made the WSN a hot topic among researchers. Certain characteristics like dynamic topologies, limited data rate and limited battery power makes routing in WSN...

    Provided By International Journal of Reviews in Computing

  • White Papers // Dec 2012

    An Efficient Implementation of Apriori Algorithm Based on Hadoop-Mapreduce Model

    Finding frequent itemsets is one of the most important fields of data mining. Apriori algorithm is the most established algorithm for finding frequent itemsets from a transactional dataset; however, it needs to scan the dataset many times and to generate many candidate itemsets. In this paper, the authors have implemented...

    Provided By International Journal of Reviews in Computing

  • White Papers // Dec 2012

    Attacks and Defense in Mobile Adhoc Networks (MANTS)

    Ever increasing days, Mobile Ad-hoc NeTwork (MANT) is becoming the important issue in an autonomous system that consists of a variety of mobile hosts forming temporary network without any fixed infrastructure. The success of Mobile Ad-hoc NETworks (MANET) strongly depends on people's confidence in its security. Various attacks against wireless...

    Provided By International Journal of Reviews in Computing

  • White Papers // Dec 2012

    Performance Examination of AES Encryption Algorithm with Constant and Dynamic Rotation

    Lately, the Rijndael algorithm has been standardized by the NIST as the Advanced Encryption Standard (AES). This makes AES an essential and necessary data-protection mechanism for federal agencies in the US and other countries. In AES, rotation occurs in key expansion, ciphering, and deciphering. Rotation is vital for confusion and...

    Provided By International Journal of Reviews in Computing

  • White Papers // Sep 2012

    Evaluation of Architecture Styles for Cloud Computing Applications

    Cloud computing is getting popular and IT giants have started evolving toward networks and different cloud services that serve different organizations. Software as a service (SaaS) is the most mature category of cloud service, since it evolved from the application-service-provider model of software hosting. As the authors' use of SaaS...

    Provided By International Journal of Reviews in Computing

  • White Papers // Sep 2012

    Philippine Science High School - Ilocos Region Campus Web Portal

    In this paper, the authors developed a web portal for the Philippine Science High School - Ilocos Region Campus (PSHSIRC). It also determined the profile of the PSHS-IRC; level of awareness and need for inclusion in the development; level of accessibility and adequacy of facilities and sources for Internet access...

    Provided By International Journal of Reviews in Computing

  • White Papers // Sep 2012

    QoS Architectures: A Detailed Review

    The ever increasing demand of internet usage has given rise to many issues like internet application management, bandwidth utilization, protocols mechanism management and, etc. But the Quality of Service (QoS) has become the hottest issue among these issues. Over the past several years, a considerable amount of research work has...

    Provided By International Journal of Reviews in Computing

  • White Papers // Sep 2012

    Open Source Web Content Management Systems to Build Social Network Websites

    The Web became more social. A lot of websites add some social features and new social network services emerged. In this paper, the authors defined the primary and secondary social features and conduct an extensive evaluation for open source Web Content Management Systems (WCMSs) in order to infer the suitable...

    Provided By International Journal of Reviews in Computing

  • White Papers // Jul 2012

    Architecture of a Virtual and Remote Laboratory

    In this paper, the authors give a detailed description of the Linux e-laboratory (TLL) architecture. To clearly illustrate the various architecture components, they take a close look at various technical solutions so as to describe the approach and methodology used to create the TLL environment for online teaching purposes. To...

    Provided By International Journal of Reviews in Computing

  • White Papers // Jul 2012

    A Critical Analysis of Personal Software Process (PSP) & PSP Tools Support

    Development proof has been exposed that software developers present very good when they subsequent defined, reusable process such as the Personal Software Process (PSP). Unreliable and qualitative proofs from production specify that there two or more than two developers doing their work side-by-side at same system, work together on the...

    Provided By International Journal of Reviews in Computing

  • White Papers // Jul 2012

    A Literature Review and Recommendations on Software Architecture Evaluation

    University Laboratory case studies are the crucial part for the success of the software engineers in real life development of software in small and medium enterprises. Most of the case studies performed for the evaluation of software processes and methods are for large scale software development. At University level most...

    Provided By International Journal of Reviews in Computing

  • White Papers // Jul 2012

    Software Process Improvement Model Comparison and Organizational Factors: A Review

    Process and Continuous Process Improvement is a very important aspect of the software organization to meet the cost effective objectives of organizations in competitive environment. So it is a very big challenge for the organizations to constantly analyze their processes and improve them whenever necessary, to make a successful and...

    Provided By International Journal of Reviews in Computing

  • White Papers // Apr 2012

    Mobile Ad-Hoc Network: Optimization of Routing Algorithms for Mobility Model

    Many wireless networking problems have to be solved for the efficient design and deployment of these communications devices that operate in a Mobile Ad-hoc NETwork (MANET) environment. A Mobile Ad-hoc NETtwork (MANET) is an infrastructure less network of mobile devices which are equipped with a transmitter and receiver. If any...

    Provided By International Journal of Reviews in Computing

  • White Papers // Apr 2012

    A Literature Review & Recommendations on Personal Software Process Tools

    Review papers and Survey research papers are the primary source of information that helps researcher to find updated knowledge in that domain. No systematic survey or review paper was found in the field of Personal Software Process Tools and Software Architecture Evaluation Tools. This requires the need of performing the...

    Provided By International Journal of Reviews in Computing

  • White Papers // Apr 2012

    Analyzing the Detection of Active Attacks in Wireless Mobile Networks

    In multi hop wireless systems, such as ad hoc and sensor networks, mobile ad hoc network applications are deployed, security emerges as a central requirement. A particularly devastating attack is known as the active attack, where two or more malicious collision nodes create a higher level virtual tunnel in the...

    Provided By International Journal of Reviews in Computing

  • White Papers // Apr 2012

    Proposed Development Model of e-Government to Appropriate Cloud Computing

    E-government projects face a lot of challenges that may lead to failure of e-government. Most important of these challenges include the human resources are not qualified and the high cost of infrastructure and the traditional infrastructure cannot scale, scalability demands change over time. The solution of these challenges in cloud...

    Provided By International Journal of Reviews in Computing

  • White Papers // Apr 2012

    Cloud Testing - Myths Facts and Challenges

    Cloud Computing is a technology which gives computation, software, data and storage services over the network. It is not necessary for the user to know the physical location and configuration of the system which deliver these services to them. This paper focuses on application of Cloud computing in the area...

    Provided By International Journal of Reviews in Computing

  • White Papers // Apr 2012

    Web Usage Mining Using Neural Network

    Web usage mining attempts to discover useful knowledge from the secondary data obtained from the interactions of the users with the Web. Web usage mining has become very critical for effective Web site management, business and support services, personalization, and network traffic flow analysis and so on. Web usage mining...

    Provided By International Journal of Reviews in Computing

  • White Papers // Dec 2011

    A Survey on Security Requirements Engineering

    Security engineering is a new research area in software engineering that covers the definition of processes, plans and designs for security. The researchers are working in this area and however there is a lack in security requirements treatment in this field. The security requirements is one of the non functional...

    Provided By International Journal of Reviews in Computing

  • White Papers // Dec 2011

    A Systematic Mapping on Analysis of Issues in Open Source Software Development

    The open source software development methodology is initiated from the concept of source code sharing. It has many promises in order to develop high quality software projects with low cost. There are certain issues which are associated with open source software development. This paper is based on systematic mapping in...

    Provided By International Journal of Reviews in Computing

  • White Papers // Dec 2011

    Test Execution Effort Estimation (TEEE) Model in Extreme Programming

    Nowadays applications are being built by using Agile Methodologies. There are small iterations under each release. Customers write user stories and after prioritizing them are included in the iteration. The communication is very high with the customer. There is a continuous integration of code and builds take place to the...

    Provided By International Journal of Reviews in Computing

  • White Papers // Dec 2011

    Communication Challenges in Success of Offshore Software Development

    Communication is a major factor of success or failure for any software project. In offshore software development OSD, communication is more critical than collocated software development. Frequent communication is not always possible due to challenges like time zone differences, holiday customs etc where client and vendor working hours do not...

    Provided By International Journal of Reviews in Computing

  • White Papers // Dec 2011

    SPF Based Selinux Operating System for Multimedia Applications

    Trusted Operating Systems, offer a number of security mechanisms that can help protect information, make a system difficult to break into, and confine attacks far better than traditional operating systems. However, this security will come at a cost, since it can degrade the performance of an operating system. This performance...

    Provided By International Journal of Reviews in Computing

  • White Papers // Sep 2011

    Secure Routing Protocols in Mobile Adhoc Networks-A Survey and Taxanomy

    Mobile Ad hoc Networks are assortment of mobile terminals or nodes, allowing no stationary infrastructure and centralized administration. A performance evaluation of routing protocol is very cumbersome due to various metrics involving dynamic topologies, mobility, routing limited resources, security etc. In this paper, various existing routing protocols were reviewed. It...

    Provided By International Journal of Reviews in Computing

  • White Papers // Sep 2011

    Review on Motivation for Selection of Open Source Software License: An Economic and Social Perspective

    Open source software development is a concept of build software by mutual sharing of source code. It is also software which released under such license which gives equal rights to both developers and users. In decade of 1980's Richard Stallman become pioneer of open source license, because it built a...

    Provided By International Journal of Reviews in Computing

  • White Papers // Sep 2011

    Effect of Different Neural Networks on the Accuracy in Iris Patterns Recognition

    A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by the individual. Iris recognition is regarded as the most reliable and accurate biometric identification system available. An approach for accurate Biometric Recognition and identification of Human Iris Patterns using Neural Network. In...

    Provided By International Journal of Reviews in Computing

  • White Papers // Jul 2011

    Certification in Electronic Payment Gateway

    This paper main aim is on security problems related to electronic payment gateway. This paper addresses the requirement of certification of users and merchants during the process of online transactions. Security of electronic payments is quite a big issue now a days and there is need of secure transaction process....

    Provided By International Journal of Reviews in Computing

  • White Papers // Jul 2011

    Analysis of Cognitive Complex Load Factor on Visual Aid Based Computer Programming Language Learning

    Computer applications are dominant and have become part of day to activities of the human life. These applications are developed by the software developers based on their expertise in domain knowledge and the skills of computer languages. Most of this knowledge of programming has developed from the educational system mainly...

    Provided By International Journal of Reviews in Computing

  • White Papers // Jul 2011

    Confidentiality of Messages in a Cardless Electronic Payment System

    In a cardless electronic payment system messages are used instead of credit or debit cards (plastic money). These messages are passed between different entities in order to do electronic transactions over a network. The security of the cardless electronic payment system is a critical issue. In case of security breaches...

    Provided By International Journal of Reviews in Computing

  • White Papers // Nov 2010

    A Reverse Transmission Approach for Multi-Hop Routing in Wireless Sensor Network

    Sensor network nodes are spreaded over specific area with limited battery energy, low computational capacity and restricted communication bandwidth. In Sensor networks, the cluster-based routing algorithms are used to reduce the energy consumption of nodes and prolong the network lifetime. In most cluster-based algorithms, a predefined number of clusters or...

    Provided By International Journal of Reviews in Computing

  • White Papers // Jul 2010

    Study on 4G Communication Architecture Components for Social Networks

    The modern communication system is aimed to reach the real world one environment from virtual world via connecting resources of one with another through social network system. The communication process is aggravated various infrastructural development to reach in this current level such as 3G and 4G communication system. The user...

    Provided By International Journal of Reviews in Computing

  • White Papers // Dec 2012

    Wireless Sensor Networks Loclaization Algorithms: A Comparative Study

    Wireless Sensor Networks (WSNs) are the type of networks that are currently used in many applications. Some of these applications are critical and their information is very sensitive e.g. battle field and health care monitoring. Any transferred data has to be known from where it comes. In other words, most...

    Provided By International Journal of Reviews in Computing

  • White Papers // Dec 2012

    Analysis of Mobile Agent Systems Performance Using Linear Prediction Model

    Mobile Agents are considered an interesting technology to develop applications for distributed systems. Thus they present features, such as autonomy and capability to roam to hosts, process data, and save remote communications. Many mobile agent platforms have been developed for research purposes while other platforms have been deployed as commercial...

    Provided By International Journal of Reviews in Computing

  • White Papers // Dec 2012

    Studying the Effects of Malicious Nodes Using Geographic Routing Protocol in the WSN

    In this paper, studying the effect of malicious nodes in the Wireless Sensor Networks (WSNs) is proposed. The low-cost, low data rate of the sensor nodes made the WSN a hot topic among researchers. Certain characteristics like dynamic topologies, limited data rate and limited battery power makes routing in WSN...

    Provided By International Journal of Reviews in Computing

  • White Papers // Dec 2012

    An Efficient Implementation of Apriori Algorithm Based on Hadoop-Mapreduce Model

    Finding frequent itemsets is one of the most important fields of data mining. Apriori algorithm is the most established algorithm for finding frequent itemsets from a transactional dataset; however, it needs to scan the dataset many times and to generate many candidate itemsets. In this paper, the authors have implemented...

    Provided By International Journal of Reviews in Computing

  • White Papers // Sep 2012

    Evaluation of Architecture Styles for Cloud Computing Applications

    Cloud computing is getting popular and IT giants have started evolving toward networks and different cloud services that serve different organizations. Software as a service (SaaS) is the most mature category of cloud service, since it evolved from the application-service-provider model of software hosting. As the authors' use of SaaS...

    Provided By International Journal of Reviews in Computing

  • White Papers // Sep 2012

    Philippine Science High School - Ilocos Region Campus Web Portal

    In this paper, the authors developed a web portal for the Philippine Science High School - Ilocos Region Campus (PSHSIRC). It also determined the profile of the PSHS-IRC; level of awareness and need for inclusion in the development; level of accessibility and adequacy of facilities and sources for Internet access...

    Provided By International Journal of Reviews in Computing

  • White Papers // Sep 2012

    QoS Architectures: A Detailed Review

    The ever increasing demand of internet usage has given rise to many issues like internet application management, bandwidth utilization, protocols mechanism management and, etc. But the Quality of Service (QoS) has become the hottest issue among these issues. Over the past several years, a considerable amount of research work has...

    Provided By International Journal of Reviews in Computing

  • White Papers // Sep 2012

    Open Source Web Content Management Systems to Build Social Network Websites

    The Web became more social. A lot of websites add some social features and new social network services emerged. In this paper, the authors defined the primary and secondary social features and conduct an extensive evaluation for open source Web Content Management Systems (WCMSs) in order to infer the suitable...

    Provided By International Journal of Reviews in Computing

  • White Papers // Jul 2012

    Architecture of a Virtual and Remote Laboratory

    In this paper, the authors give a detailed description of the Linux e-laboratory (TLL) architecture. To clearly illustrate the various architecture components, they take a close look at various technical solutions so as to describe the approach and methodology used to create the TLL environment for online teaching purposes. To...

    Provided By International Journal of Reviews in Computing

  • White Papers // Jul 2012

    A Critical Analysis of Personal Software Process (PSP) & PSP Tools Support

    Development proof has been exposed that software developers present very good when they subsequent defined, reusable process such as the Personal Software Process (PSP). Unreliable and qualitative proofs from production specify that there two or more than two developers doing their work side-by-side at same system, work together on the...

    Provided By International Journal of Reviews in Computing

  • White Papers // Jul 2012

    A Literature Review and Recommendations on Software Architecture Evaluation

    University Laboratory case studies are the crucial part for the success of the software engineers in real life development of software in small and medium enterprises. Most of the case studies performed for the evaluation of software processes and methods are for large scale software development. At University level most...

    Provided By International Journal of Reviews in Computing

  • White Papers // Jul 2012

    Software Process Improvement Model Comparison and Organizational Factors: A Review

    Process and Continuous Process Improvement is a very important aspect of the software organization to meet the cost effective objectives of organizations in competitive environment. So it is a very big challenge for the organizations to constantly analyze their processes and improve them whenever necessary, to make a successful and...

    Provided By International Journal of Reviews in Computing

  • White Papers // Apr 2012

    Mobile Ad-Hoc Network: Optimization of Routing Algorithms for Mobility Model

    Many wireless networking problems have to be solved for the efficient design and deployment of these communications devices that operate in a Mobile Ad-hoc NETwork (MANET) environment. A Mobile Ad-hoc NETtwork (MANET) is an infrastructure less network of mobile devices which are equipped with a transmitter and receiver. If any...

    Provided By International Journal of Reviews in Computing

  • White Papers // Apr 2012

    A Literature Review & Recommendations on Personal Software Process Tools

    Review papers and Survey research papers are the primary source of information that helps researcher to find updated knowledge in that domain. No systematic survey or review paper was found in the field of Personal Software Process Tools and Software Architecture Evaluation Tools. This requires the need of performing the...

    Provided By International Journal of Reviews in Computing

  • White Papers // Apr 2012

    Analyzing the Detection of Active Attacks in Wireless Mobile Networks

    In multi hop wireless systems, such as ad hoc and sensor networks, mobile ad hoc network applications are deployed, security emerges as a central requirement. A particularly devastating attack is known as the active attack, where two or more malicious collision nodes create a higher level virtual tunnel in the...

    Provided By International Journal of Reviews in Computing

  • White Papers // Apr 2012

    Proposed Development Model of e-Government to Appropriate Cloud Computing

    E-government projects face a lot of challenges that may lead to failure of e-government. Most important of these challenges include the human resources are not qualified and the high cost of infrastructure and the traditional infrastructure cannot scale, scalability demands change over time. The solution of these challenges in cloud...

    Provided By International Journal of Reviews in Computing

  • White Papers // Apr 2012

    Cloud Testing - Myths Facts and Challenges

    Cloud Computing is a technology which gives computation, software, data and storage services over the network. It is not necessary for the user to know the physical location and configuration of the system which deliver these services to them. This paper focuses on application of Cloud computing in the area...

    Provided By International Journal of Reviews in Computing

  • White Papers // Apr 2012

    Web Usage Mining Using Neural Network

    Web usage mining attempts to discover useful knowledge from the secondary data obtained from the interactions of the users with the Web. Web usage mining has become very critical for effective Web site management, business and support services, personalization, and network traffic flow analysis and so on. Web usage mining...

    Provided By International Journal of Reviews in Computing

  • White Papers // Nov 2013

    A Double Guard Hill Cipher Suitable for Wireless Sensor Networks

    A Classical Hill cipher breaks the plaintext into blocks and multiplies each block to a key matrix to obtain the cipher text. But it inclines to known plaintext. To strength the Hill cipher, a novel modification is performed in this paper. A double protection has been given for the Hill...

    Provided By International Journal of Reviews in Computing

  • White Papers // Nov 2013

    The Relationship of Information Security Knowledge (ISK) and Human Factors: Challenges and Solution

    Information, knowledge, and information security are indispensable in an organisation to ensure the effectiveness of an organisation. An organisation needs people who have adequate information and knowledge to run a business. Lack of knowledge especially in information security may jeopardise the organisation such as the increase of internal security incidents....

    Provided By International Journal of Reviews in Computing

  • White Papers // Oct 2013

    A New Database Integration Model Using an Ontology-Driven Mediated Warehousing Approach

    Database integration technology has been developed for more than 20 years. The difficulties of database integration are the integration of heterogeneous data sources, with respect to the schemas and their data, as well as the query processing time that can take longer than expected. In this paper, the authors present...

    Provided By International Journal of Reviews in Computing

  • White Papers // Jul 2010

    Study on 4G Communication Architecture Components for Social Networks

    The modern communication system is aimed to reach the real world one environment from virtual world via connecting resources of one with another through social network system. The communication process is aggravated various infrastructural development to reach in this current level such as 3G and 4G communication system. The user...

    Provided By International Journal of Reviews in Computing

  • White Papers // Nov 2010

    A Reverse Transmission Approach for Multi-Hop Routing in Wireless Sensor Network

    Sensor network nodes are spreaded over specific area with limited battery energy, low computational capacity and restricted communication bandwidth. In Sensor networks, the cluster-based routing algorithms are used to reduce the energy consumption of nodes and prolong the network lifetime. In most cluster-based algorithms, a predefined number of clusters or...

    Provided By International Journal of Reviews in Computing

  • White Papers // Sep 2011

    Secure Routing Protocols in Mobile Adhoc Networks-A Survey and Taxanomy

    Mobile Ad hoc Networks are assortment of mobile terminals or nodes, allowing no stationary infrastructure and centralized administration. A performance evaluation of routing protocol is very cumbersome due to various metrics involving dynamic topologies, mobility, routing limited resources, security etc. In this paper, various existing routing protocols were reviewed. It...

    Provided By International Journal of Reviews in Computing

  • White Papers // Sep 2011

    Review on Motivation for Selection of Open Source Software License: An Economic and Social Perspective

    Open source software development is a concept of build software by mutual sharing of source code. It is also software which released under such license which gives equal rights to both developers and users. In decade of 1980's Richard Stallman become pioneer of open source license, because it built a...

    Provided By International Journal of Reviews in Computing

  • White Papers // Sep 2011

    Effect of Different Neural Networks on the Accuracy in Iris Patterns Recognition

    A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by the individual. Iris recognition is regarded as the most reliable and accurate biometric identification system available. An approach for accurate Biometric Recognition and identification of Human Iris Patterns using Neural Network. In...

    Provided By International Journal of Reviews in Computing

  • White Papers // Dec 2011

    A Survey on Security Requirements Engineering

    Security engineering is a new research area in software engineering that covers the definition of processes, plans and designs for security. The researchers are working in this area and however there is a lack in security requirements treatment in this field. The security requirements is one of the non functional...

    Provided By International Journal of Reviews in Computing

  • White Papers // Dec 2011

    A Systematic Mapping on Analysis of Issues in Open Source Software Development

    The open source software development methodology is initiated from the concept of source code sharing. It has many promises in order to develop high quality software projects with low cost. There are certain issues which are associated with open source software development. This paper is based on systematic mapping in...

    Provided By International Journal of Reviews in Computing

  • White Papers // Dec 2011

    Test Execution Effort Estimation (TEEE) Model in Extreme Programming

    Nowadays applications are being built by using Agile Methodologies. There are small iterations under each release. Customers write user stories and after prioritizing them are included in the iteration. The communication is very high with the customer. There is a continuous integration of code and builds take place to the...

    Provided By International Journal of Reviews in Computing

  • White Papers // Dec 2011

    Communication Challenges in Success of Offshore Software Development

    Communication is a major factor of success or failure for any software project. In offshore software development OSD, communication is more critical than collocated software development. Frequent communication is not always possible due to challenges like time zone differences, holiday customs etc where client and vendor working hours do not...

    Provided By International Journal of Reviews in Computing

  • White Papers // Dec 2011

    SPF Based Selinux Operating System for Multimedia Applications

    Trusted Operating Systems, offer a number of security mechanisms that can help protect information, make a system difficult to break into, and confine attacks far better than traditional operating systems. However, this security will come at a cost, since it can degrade the performance of an operating system. This performance...

    Provided By International Journal of Reviews in Computing

  • White Papers // Jul 2011

    Certification in Electronic Payment Gateway

    This paper main aim is on security problems related to electronic payment gateway. This paper addresses the requirement of certification of users and merchants during the process of online transactions. Security of electronic payments is quite a big issue now a days and there is need of secure transaction process....

    Provided By International Journal of Reviews in Computing

  • White Papers // Jul 2011

    Analysis of Cognitive Complex Load Factor on Visual Aid Based Computer Programming Language Learning

    Computer applications are dominant and have become part of day to activities of the human life. These applications are developed by the software developers based on their expertise in domain knowledge and the skills of computer languages. Most of this knowledge of programming has developed from the educational system mainly...

    Provided By International Journal of Reviews in Computing

  • White Papers // Jul 2011

    Confidentiality of Messages in a Cardless Electronic Payment System

    In a cardless electronic payment system messages are used instead of credit or debit cards (plastic money). These messages are passed between different entities in order to do electronic transactions over a network. The security of the cardless electronic payment system is a critical issue. In case of security breaches...

    Provided By International Journal of Reviews in Computing

  • White Papers // Dec 2012

    Attacks and Defense in Mobile Adhoc Networks (MANTS)

    Ever increasing days, Mobile Ad-hoc NeTwork (MANT) is becoming the important issue in an autonomous system that consists of a variety of mobile hosts forming temporary network without any fixed infrastructure. The success of Mobile Ad-hoc NETworks (MANET) strongly depends on people's confidence in its security. Various attacks against wireless...

    Provided By International Journal of Reviews in Computing

  • White Papers // Dec 2012

    Performance Examination of AES Encryption Algorithm with Constant and Dynamic Rotation

    Lately, the Rijndael algorithm has been standardized by the NIST as the Advanced Encryption Standard (AES). This makes AES an essential and necessary data-protection mechanism for federal agencies in the US and other countries. In AES, rotation occurs in key expansion, ciphering, and deciphering. Rotation is vital for confusion and...

    Provided By International Journal of Reviews in Computing