IRD India

Displaying 1-40 of 474 results

  • White Papers // Aug 2015

    Effective and Key Sensitive Security Algorithm for an Image Processing Using Robust Rubik Encryption & Decryption Process

    Encryption and decryption are the essential processes in multimedia processing. Especially, in digital image processing, the importance of these two is high. Digital image processing facing several problems in recent times, those are protection of owner rights and designing of perfect encryption algorithm against hacker attacks. In recent years, different...

    Provided By IRD India

  • White Papers // Aug 2015

    Malware Analysis Using System Call Monitoring

    As use of Smartphone increases, threat of malware in Smartphone also increases. In Smartphone industry, Android is becoming more popular because of its open nature. This makes android a target of most of the attackers. The authors can use system call monitoring technique to detect malicious activity. In this paper,...

    Provided By IRD India

  • White Papers // Aug 2015

    Cryptography: The Science of Secure Communication

    Day-by-day, network and internet applications are becoming very popular. Sensitive information requires security and safety measures. Security is the most challenging aspect in the internet and network applications. Encryption algorithm provides the necessary protection against the data intruders' attacks by converting information from its normal form into an unreadable form....

    Provided By IRD India

  • White Papers // Aug 2015

    Mining of Best Technique of Requirement for Software Development: Comparison of Ten Techniques for Gathering Requirements

    Each and every organization is rapidly taking a turn from manual to automatic computing. For this customized software is developed by the software companies. Before development software companies require their requirements. Requirement may span a wide range of statements and statement can be imprecise, incomplete and inconsistent. If requirement is...

    Provided By IRD India

  • White Papers // Aug 2015

    Survey Paper on "Digital Forensics using Data Mining"

    With the rapid advancements in information and communication technology in the world, crimes committed are becoming technically intensive. When crimes committed use digital devices and forensic examiners have to adopt practical frameworks and methods to recover data for analysis which can pose as evidence. This concept explains emerging cyber-crimes, forensic...

    Provided By IRD India

  • White Papers // Jul 2015

    Space Time Block Codes for MIMO Systems

    Data is encoded using a space-time block code and the encoded data is split into n streams which are simultaneously transmitted using n transmit antennas. The received signal at each receive antenna is a linear superposition of the n transmitted signals perturbed by noise. The wireless systems that is evolved...

    Provided By IRD India

  • White Papers // Jul 2015

    Dynamic Multipath Routing for Wireless Ad Hoc Networks

    Wireless Sensor Network (WSN) is expected to have a significant impact on the efficiency of military and civil applications such as target field imaging, intrusion detection and weather monitoring. Sensors with low cost, low power and multifunction are expected to last until their energy drains, so energy-conserving forms of communication...

    Provided By IRD India

  • White Papers // Jul 2015

    An Overview Paper on Modelling of Complex Chaotic Signals using Artificial Intelligence

    In this paper, the authors are considering different chaotic signals and their results so that they can work on the best method. The analysis clarifies the relationship to stochastic signal models as well, here Introduction of chaotic signal processing is an emerging discipline which tries to use results from the...

    Provided By IRD India

  • White Papers // Jul 2015

    Intrusion Protection Against SQL Injection Attack and Cross Scripting Attack Using A Hybrid Method

    Keeping in mind the increasing volume of real time transactions on the internet, security in web applications is vital to protect the value and usability of assets. The level of security has neither grown as fast as the Internet applications nor evolved as fast as the attacks and intrusions, exposing...

    Provided By IRD India

  • White Papers // Jul 2015

    Study of Design of Distributed Energy Efficient and Reliable Routing Protocol for Wireless Sensor Networks

    A Wireless Sensor Network (WSN) is a collection of nodes organized into a cooperative network, which are small energy constrained devices the efficient use of energy source in a sensor node is most desirable criteria for prolong the life time of wireless sensor network. So designing efficient routing for reducing...

    Provided By IRD India

  • White Papers // Jul 2015

    Overcome of Vampire Attack using Clustering on Routing Protocol in WSN

    In a wireless networks the future research direction in prevention of vampire attack by existing routing protocol. This paper is to examine resource depletion attacks at the routing protocol layer, which attempts to permanently disable network nodes by quickly draining their battery power. In this paper, presents analysis of routing...

    Provided By IRD India

  • White Papers // Jun 2015

    Mining With Big Data Using HACE

    With a fast growth of networking, streaming, data storage and its collection capacity, big data are now unfolding fastly in all fields of science, medical, engineering, politics, entertainment, social media etc. with all this autonomous sources having complex and evolving relationships between the, heterogeneous data is accumulated, this is a...

    Provided By IRD India

  • White Papers // Jun 2015

    Software Development Effort Estimation using Fuzzy Logic Framework- An Implementation

    Software development effort estimation is very important and critical task when the authors have to develop new or reusable software. This paper is to provide a technique for software cost estimation technique that performs better than other techniques on the accuracy of effort estimation. This paper proposed to extend the...

    Provided By IRD India

  • White Papers // Jun 2015

    Proactive Source Routing Protocol for Mobile Ad Hoc Networks Using BFST Algorithm

    Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networking, with most research conducted for stationary wireless networks. One of the reasons why opportunistic data forwarding has not been widely utilized in Mobile Ad hoc NETworks (MANETs) is the lack of an efficient lightweight proactive...

    Provided By IRD India

  • White Papers // Jun 2015

    Implementation of MANETs over 6LoWPAN

    A Mobile Ad hoc NETwork (MANET) is a multi-hop wireless network which has created a new era in the wireless communication. The mobility of MANET nodes can lead to frequent and unpredictable topology changes for which a recent scheme using 6LoWPAN, targeted for any LoWPAN devices is used as there...

    Provided By IRD India

  • White Papers // Jun 2015

    Design of Filter Bank Multicarrier Transceiver with MMSE Equalization

    Beyond 2020 5G will be the next generation of mobile communication compared to the current standards (4G/3G and 2G) which give high data rates, efficient usage of spectrum and system resources. Multicarrier systems provide many attractive properties for high rate wireless communications. A major advantage of the multicarrier approach is...

    Provided By IRD India

  • White Papers // Jun 2015

    An Optimal Driving System by Using Wireless Helmet

    In this paper, the authors based on the interaction system for motorcycle is implemented using wireless helmet. The system consists of a vehicle-to-driver, vehicle-to-traffic signal and vehicle-to-speed breaker communication mechanism, which is based on a ZigBee technology. This proposed system is to enhance the safety of the driver as well...

    Provided By IRD India

  • White Papers // Jun 2015

    Advanced Adaptive Meter with Pre Unit Limit and Security Alert

    The existing systems are either an electronic energy meter or an electro-mechanical meter which are currently in use is limited to record up to kWh units. The kWh units recorded by meter readers monthly, on foot which need to be processed by a meter reading company. For processing the meter...

    Provided By IRD India

  • White Papers // Jun 2015

    GSM Based Fuel Theft Detector Using Microcontroller

    In this paper, the authors have focused on developing an enhancement of the vehicle alarm security system via SMS. The system will manipulate a mobile phone to send SMS. Even though the SMS can be sent using the features available in the mobile, the objective of this experiment is to...

    Provided By IRD India

  • White Papers // Jun 2015

    Reducing Power and Interference Using a Routing and Multichannel Allocation Approach in Wireless Sensor Networks for Internet of Things (IoTs)

    In general, the wireless signals in the wireless video sensor network will interfere with each other if they are having same signal range, so nodes must be allocated with different appropriate channels and edges. In these wireless video sensors network each node is consisting of battery powered video camera sensors,...

    Provided By IRD India

  • White Papers // Jun 2015

    Lifetime Maximization Energy Efficient Routing Protocol for Ad Hoc Wireless Networks

    Ad hoc networks are wireless mobile networks that can operate without infrastructure and without centralized network management. Traditional techniques of routing are not well adapted. Indeed, their lack of reactivity with respect to the variability of network changes makes them difficult to use. Moreover, conserving energy is a critical concern...

    Provided By IRD India

  • White Papers // Jun 2015

    Efficient Evaluation of Query for XML Graph Based on Single Source Shortest Path

    XML (eXtensible Markup Language) is widely accepted as the standard for data representation and e-data interchange. Therefore, a large amount of data is stored in database. How to store bulk amount of data and fetch the expected data with an intelligent approach is the most common and important question. It...

    Provided By IRD India

  • White Papers // May 2015

    Design of High Throughput AXI Compliant DDR3 Controller

    In this paper, the authors describe the implementation of AXI compliant DDR3 memory controller. It discusses the overall architecture of the DDR3 controller along with the detailed design and operation of its individual sub blocks, the pipelining implemented in the design to increase the design throughput. It also discusses the...

    Provided By IRD India

  • White Papers // May 2015

    Security Providing When Disclosing Information By Using K-Anonymity Privacy Concept Method

    The technological advances in sensor technologies, wireless sensor networks are also used to control the temperature and humidity levels inside commercial greenhouses. The authors proposed two algorithms like, resource aware and quality aware algorithms. This both algorithms works on k-anonymity privacy concept like k-anonymity and location k-anonymity. There are two...

    Provided By IRD India

  • White Papers // May 2015

    An Advanced and Low Power LBIST for Cryptographic Applications

    In this paper, the authors play vital role in all type of communication applications. This paper presents a novel low-transition Linear Feedback Shift Register (LFSR) that is based on some new observations about the output sequence of a conventional LFSR. Security of a hardware implementation can be compromised by a...

    Provided By IRD India

  • White Papers // May 2015

    Lifetime Maximizing Data Gathering Tree in Wireless Sensor Networks K-means based Prim's Algorithm

    The energy efficiency is significant while collecting data in Wireless Sensor Network (WSN) due to source energy limitations and high transmission cost. In this paper, construction of data gathering tree using k-means based Prim's algorithm is done. A Lifetime Maximizing Minimum Spanning Tree (LMMST) for the complete network is constructed...

    Provided By IRD India

  • White Papers // May 2015

    Automatic Saline Level Monitoring System Using Microcontroller ATMEGA 328

    In this paper, the authors propose an automatic, low cost saline level measurement system using microcontroller ATMEGA 328.The main building blocks of the proposed system are microcontroller ATMEGA 328, Bluetooth module and IR sensors. The system contains two LEDs. The status of the saline can be given in two forms...

    Provided By IRD India

  • White Papers // May 2015

    Controller Area Network to Ethernet Conversion Using Raspberry Pi

    Controller Area Network (CAN) and Ethernet both use Carrier Sense Multiple Access with Collision Detection (CSMA/CD) as a media access control method. Beyond that, the CAN protocol is based on CSMA/ CD/AMP (Carrier-Sense Multiple Access/Collision Detection with Arbitration on Message Priority) protocol. Due to CSMA/CD in Ethernet as soon as...

    Provided By IRD India

  • White Papers // May 2015

    Human Computer Interaction Using Gesture Recognition System

    Hand gesture communication is a non-verbal interaction which is widely used to interaction of the physical world with the digital world. Hand gesture communication uses the people's hands or figures to move objects around for more complex expressions for the feelings and also used for communicating with others. Gestures are...

    Provided By IRD India

  • White Papers // May 2015

    Cluster Based Energy Efficient Routing Protocol in Wireless Networks

    Wireless sensor network is a wireless network consists of spatially distributed autonomous devices using sensor to monitor various conditions. There are many issues concerned with wireless sensor networks, namely fault tolerance, production cost, scalability, data aggregation, security, quality of service and routing. Since the network life time depends on power...

    Provided By IRD India

  • White Papers // May 2015

    A Survey on Shortest Path Estimation Using RDBMS Over Graph

    Recently with the advancement of social networking sites vast amount of data emerges out, which is usually in the form of graph data. Many graph search queries are in use to access and retrieve this data. Shortest path computation is required in many applications for their faster execution and can...

    Provided By IRD India

  • White Papers // May 2015

    On Clouds the Authentication of Data Storage Using Decentralized Access Control by Unidentified Way

    The authors propose the secure data storage in clouds for a new decentralized access. The cloud verifies the authenticity of the series without knowing the user's identity in the proposed scheme. Their feature is that only valid users can able to decrypt the stored information. It prevents from the replay...

    Provided By IRD India

  • White Papers // May 2015

    On the Utilization Aspect of Document Data for Mining the Side Information

    In text mining applications, side-information is also available along with the text documents. This side-information can be like document provenance information, links existing inside the document, web logs based on user-access behavior, or non-textual attributes which exist in the text document. Such attributes will contain remarkable amount of information for...

    Provided By IRD India

  • White Papers // May 2015

    Design and Implementation of Spartan 6 Series FPGA Board and Application of PID Controller for Robots

    The Spartan-6 family of field-programmable gate arrays is one of the latest devices and specifically designed to meet the needs of high volume, cost-sensitive consumer electronic applications. The thirteen-member family offers densities ranging from 3,840 to 147,443 logic cells and system gates. The Spartan-6 family builds on the success of...

    Provided By IRD India

  • White Papers // May 2015

    A Novel Approach for Implementation of AES Algorithm on NOC

    Network-on-Chip (NoC) is the scalable platform where billion transistors have been integrated on to a single chip. NoC architecture is an mxn mesh of processing elements where resources are placed on the slots formed by the switches. Each switch is connected to one resource and four neighboring switches, and each...

    Provided By IRD India

  • White Papers // May 2015

    Image and Text Steganography Based on RSA and Chaos Cryptography Algorithm with Hash-LSB Technique

    Now-a-days, security is one of the major problem facing all over the world. To protect the user's secret information from the strangers it is necessary to convert the information into unrecognizable form. To protect information from unauthorized access various methods for information hiding like steganography, cryptography and hash-LSB techniques have...

    Provided By IRD India

  • White Papers // May 2015

    A Survey on Web Application Vulnerabilities

    Web applications are becoming popular and ubiquitous in the people's daily lives. The web applications are used for multiple purposes such as e-commerce, financial services, emails, healthcare services and many other captious services. Multiple web browsers are available for accessing these web applications. Due to presence of vulnerabilities in web...

    Provided By IRD India

  • White Papers // May 2015

    Study of the Thermal Effects of EM Radiation From Mobile Phones on Human Head Using IR Thermal Camera

    In this paper, the authors investigate the thermal effects of electromagnetic radiation on human head through mobile phones before and after call, in order to find the temperature variation on skin in the right outer ear (Concha) using a thermal camera. A study population of n

    Provided By IRD India

  • White Papers // May 2015

    Distance based Data Mining by Multi-Level Clustering in Wireless Sensor Network

    The wireless sensor network is an emerging technology in the era of communication network. In many applications, for the data transmission from base station to different communicating nodes this technology is widely used. But due to the wide area communication and lack of connection range in between far away nodes...

    Provided By IRD India

  • White Papers // May 2015

    Analysis of Harmonics in Five Phase Inverter Drive with Double Tuned Filter Using Simulink/LATLAB

    The advancement in present technologies high speed electronics is generates unwanted harmonics in the line voltages and currents. Mitigation of harmonics is the present challenge and the best solution is to implement with the filters. This paper presents the design of double tuned filter to reduce the voltage/current harmonics produced...

    Provided By IRD India

  • White Papers // Dec 2012

    Border Gateway Protocol - A Best Performance Protocol When Used for External Routing Than Internal Routing

    The paper addresses the interoperability issues between Internal Border Gateway Protocol (IBGP) over other Interior Gateway Protocols (IGPs) by knowing the characteristics of the respective protocols and also studies the efficiency of External Border Gateway Protocol (EBGP) as an Exterior Gateway Protocol (EGP). Furthermore, it shows how IGRP proves to...

    Provided By IRD India

  • White Papers // Jun 2013

    Two Phase Dynamic Channel Assignment Protocol on Multi-Channel Multi-Interface Wireless Ad Hoc Networks

    Using multiple channels over single channel the performance can be significantly increased since the use of multiple channels can reduce interference influence. Channel assignment is one of the most basic and major concern in such networks. By effectively utilizing multiple non overlapping channels and multiple interfaces, collision and co-channel interference...

    Provided By IRD India

  • White Papers // Jun 2013

    3 Dimensional Security in Cloud Computing

    Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. So it is emerging field...

    Provided By IRD India

  • White Papers // Jun 2013

    To Implement SaaS Multitenant Framework Security in Cloud Computing

    Cloud computing, a rapidly developing information technology, has aroused the concern of the whole world. Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Cloud computing is the product of the fusion of traditional computing technology and...

    Provided By IRD India

  • White Papers // Apr 2013

    Enriching Mobile Multimedia Applications Using Cloud Mobile Media

    Cloud Mobile Gaming (CMG), an approach that enables rich multiplayer Internet games on mobile devices, where compute intensive tasks like graphic rendering are executed on cloud servers in response to gaming commands on a mobile device, and the resulting video has to be streamed back to the mobile device in...

    Provided By IRD India

  • White Papers // Apr 2013

    Articulate Features for Mobile-Social TV System Using Cloud Computing

    The recent cloud computing technology, with its rich resources to compensate for the limitations of mobile devices and connections, can potentially provide an ideal platform to support the desired mobile services. In this paper, Articulate Features for Mobile-Social TV System using Cloud Computing (CloudMoV) is proposed. This system effectively utilizes...

    Provided By IRD India

  • White Papers // May 2013

    Analytical Survey Model on Consumption of Cloud Service Models

    A new paradigm of computing is evolved that is cloud computing where word cloud is used as an allegory for the internet. The incarnation of this technology forces the organizations to rapidly shifting their IT systems from traditional client/server to cloud computing model where everything is offered as a service...

    Provided By IRD India

  • White Papers // Oct 2013

    ASIC Implementation of 128 Bit Key Rc5 Cipher

    In this paper, the authors present the design of RC5 algorithm and its physical design implementation. The RC5 cryptographic algorithm is widely used in wireless communication networks like WSAN and WBSN. RC5 is a fast block cipher, developed by RSA security, which exploits data rotation to achieve a high level...

    Provided By IRD India

  • White Papers // Oct 2013

    ASIC Implementation of Multi-Threaded Pipelined Aes Crypto Processor

    In this paper, the authors present AES algorithm implementation using multi-threaded and pipelining concept for faster data encryption and its physical implementation using 40nm technology. AES crypto-algorithm is widely used in secured wireless communications, zigbee, Electronic financial transactions, content protection, digital rights, set-top boxes etc. The AES algorithm is symmetric...

    Provided By IRD India

  • White Papers // Aug 2013

    Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack

    Mobile Ad-hoc NETwork (MANET) is a group of wireless mobile nodes connected to each other without any central administrator. Nodes can move from one place to another in the network or may leave or join the network at any time. Due to this the topology of the network changes rapidly....

    Provided By IRD India

  • White Papers // Aug 2013

    Hybrid Technique for Human Identification Using Information Theory

    Humans can be individualized based on their facial characteristics. However, identifying a face becomes a challenging task due to the complexities involved. The Visual models of face include many parameters. In this paper different algorithms and parameters are studied and computed for real time results. The combined PCA and geometric...

    Provided By IRD India

  • White Papers // Aug 2013

    Outlier Detection for Large Datasets

    Finding outlier or anomaly in large dataset is an important problem in areas such as electronic commerce, credit card fraud, and even the analysis of performance statistics of professional athletes. The identification of outliers can lead to the discovery of truly unexpected knowledge. LOF (Local Outlier Factor) is a classical...

    Provided By IRD India

  • White Papers // Aug 2013

    Live Virtual Machine Migration Based on Cow Checkpointing Using XEN Hypervisor

    Live Virtual Machine (VM) migration usually involves migrating physical memory image, the network connections and virtual device state. Live migration has been proposed to reduce the downtime of migrating the virtual machine from host to destination by encountering pre-copy approach. If dirty memory generation is high, it takes long time...

    Provided By IRD India

  • White Papers // Aug 2013

    Predictable Testing of Phishing Websites Based on Deportment Model Approach

    A phishing attack is a criminal activity which mimics a certain legitimate webpage using a fake webpage with an intention of luring end-users to visit the fake website thereby stealing their personal information such as usernames, passwords and other personal details such as credit card information. An attacker might generate...

    Provided By IRD India

  • White Papers // Jul 2012

    Null Direction Propagation of Antennas and Counter Measures in Tactical High Frequency Sky Wave Communication

    In tactical High Frequency (HF) communication, sky wave and ground wave mode establish the radio link. There is a phenomenon by which antenna in ground wave mode communicates with antenna in sky wave mode. This happens due to emission of radio waves in the NULL direction. This emission can be...

    Provided By IRD India

  • White Papers // Jul 2012

    High Throughput Lossless Data Compression Algorithm

    Compression algorithms reduce the redundancy in data representation to decrease the storage required for that data. Data compression offers an attractive approach to reducing communication costs by using available bandwidth effectively. Though this scheme has clear benefits, the execution time of compression and decompression is critical to its application in...

    Provided By IRD India

  • White Papers // Jul 2012

    Achieving Privacy Preservation Schemas Against Traffic Analysis in Multi-Hop Wireless Networks

    Privacy threat is one of the critical issues in multihop wireless networks, where attacks such as traffic analysis and flow tracing can be easily launched by a malicious adversary due to the open wireless medium. Network coding has the potential to thwart these attacks since the coding/mixing operation is encouraged...

    Provided By IRD India

  • White Papers // Jul 2012

    Discovering Data Storage by Task Scheduling and Network Construction for Data Compression in Global Position System

    Data storage and transmission, task scheduling, and network construction used for that. The authors have proposed a clustering algorithm to find the group relationships for query and data aggregation efficiency. This paper are as follows: First, since the clustering algorithm itself is a centralized algorithm, in this paper, they further...

    Provided By IRD India

  • White Papers // Oct 2012

    BgpAND - Architecting a Modular BGP4 Attack & Anomalies Detection Platform

    Border Gateway Protocol (BGP) is an Autonomous System (AS) routing protocol. It forms the backbone of Internet core routing decisions. However, it is also equally prone to security issues and several attempts to attack & exploit the protocol have been noted. bgpAND is a platform designed and developed to analyze...

    Provided By IRD India

  • White Papers // Oct 2012

    Safer Data Transmission Using Steganography

    Today's Internet connected networks are under permanent attack by intruders and hackers. The explosive growth of computer systems and their interconnections has led to a heightened awareness of the need to protect the data transmitted. There are many ways already existing and also discovered daily. The field of cryptography has...

    Provided By IRD India

  • White Papers // Oct 2012

    A Scheme for Key Revocation in Wireless Sensor Networks

    Key revocation is a challenging task in wireless sensor networks. There can be many nodes in a sensor network sharing the same key(s) in their key ring. If any of those nodes in the network gets compromised then the keys of those nodes having same keys will also be revealed....

    Provided By IRD India

  • White Papers // Nov 2012

    Parallel Data Mining and Assurance Service Model Using Hadoop in Cloud

    In the information industry, huge amount of data is widely available and there is an imminent need for turning such data into useful information. This need is fulfilled by the process of exploration and analysis, by automatic or semi-automatic means, of large quantities of data provided by Data Mining. In...

    Provided By IRD India

  • White Papers // Dec 2012

    Multiple Trust in Trust-Based On-Demand Routing in Mobile Ad Hoc Networks

    Mobile Ad-hoc NETworking is concept of communication, which means a communication temporary network without any form of centralized administration. Every node in this network acts both as host and a router to forward packets for other node. Due to the absence of the centralized administration, MANETs are easily attacked by...

    Provided By IRD India

  • White Papers // Dec 2012

    A High Speed Frequency Based Multimodal Biometric System Using Iris and Fingerprint

    In this paper, the authors adopt a unified viewpoint to extract singular points (core and delta) that determine the topological structure and largely influence the orientation field by using the principal of Gabor basis functions. Lastly the points are classified into classes by method of Poincare index for Fingerprint classification....

    Provided By IRD India

  • White Papers // Jul 2012

    Traffic Management Through Inter-Communication Between Cars Using VANET System

    Vehicular Ad-hoc NETwork (VANET) basically used to provide various services to its user. Misbehaviour of such system should be defended. VANET system provides the intercommunication between the vehicles by letting them exchange the traffic information. Such kind of exchanges may create privacy apprehension since the vehicle-generated information can contain much...

    Provided By IRD India

  • White Papers // Oct 2013

    A Review of Cloud Computing and Security Issues at Different Levels in Cloud Computing

    Cloud computing is one of exciting technology with its ability of minimizing costs associated with computing while increasing flexibility, scalability and availability for computer processes. Cloud computing can be viewed as different things to different people and its elastic nature makes it suitable to any organization. Cloud computing can do...

    Provided By IRD India

  • White Papers // Apr 2013

    Detection and Prevention of Web Application Security Attacks

    Today's Web applications can contain dangerous security flaws. The global distribution of these applications makes them prone to attacks that uncover and maliciously exploit a variety of security vulnerabilities. Research reports indicate that more than 80 percent of the web applications are vulnerable to security threats. User friendly web applications...

    Provided By IRD India

  • White Papers // Apr 2013

    A Ranking Based Approach in Security Alert for Handling Sensitive Data Organization

    An organization undoubtedly wants to preserve and retain data stored in an organization's computers. On the other hand, this data is necessary for daily work processes. Users within the organization's perimeter (e.g., employees, subcontractors, or partners) perform various actions on this data (e.g., query, report, and search) and may be...

    Provided By IRD India

  • White Papers // Apr 2013

    Credit Card Endorsement using Biometrics in Cloud Computing

    This application focused on the credit card authentication. The concept of biometrics is integrated along with the cloud for secure data access. The existing system of the credit card allows the user to do the transaction but there is no security measures to verify whether the user is authenticated or...

    Provided By IRD India

  • White Papers // Aug 2013

    Envisaging Roles for Access Security

    Access Control is the principle process of enterprise risk and Security Management. Role Based Access Control (RBAC) is the model for effective management of risk arises in safeguarding three important features of security Secrecy, Integrity and no Denial of Service (DoS). This paper addresses the new approach called \"Role visualization\"...

    Provided By IRD India

  • White Papers // Sep 2013

    Data Security for Unreliable Clouds Using Reliable Encryption

    Data Security is one of the most critical aspects in a cloud computing environment due to the sensitivity and importance of information stored in the cloud. The risk of malicious insiders in the cloud and the failure of cloud services have received a great deal of attention by companies. This...

    Provided By IRD India

  • White Papers // Jul 2013

    Pair Hand: A Pairing-Based Cryptography to Secure Handover Process

    Seamless handover over multiple access points is highly desirable to mobile nodes, but ensuring security and efficiency of this process is challenging. This paper shows that prior handover authentication schemes incur high communication and computation costs and are subject to a few security attacks. Further, a novel handover authentication protocol...

    Provided By IRD India

  • White Papers // Jul 2013

    Development of CGI Based Front End for Implementation of Security Policies and Application Layer Filtering

    A system with vulnerabilities in operating system and installed software which are connected to internet are liable to attacks from the outside world as the outermost protecting layer firewall will not block all the attacks .So a second layer of protection can be built at the host level to prevent...

    Provided By IRD India

  • White Papers // Apr 2013

    Reversible Steganographic Technique Based on IWT for Enhanced Security

    Steganography is used to hide a secret message within a cover image, thereby yielding a stego image such that even the trace of the presence of secret information is wiped out. The purpose of steganography is to maintain secret communication between two users. Steganography has several technical challenges namely high...

    Provided By IRD India

  • White Papers // Jun 2013

    Three-Dimensional Password Generation Technique for Accessing Cloud Services

    Cloud computing refers to the use and access of multiple server-based computational re-sources via a digital network (WAN, Internet connection using the World Wide Web, etc.). To utilize these services by intended customer, it is necessary to have strong password authentication. At present, cloud password authentication can be done in...

    Provided By IRD India

  • White Papers // Nov 2012

    Selective Encryption Algorithm for Wireless Ad-hoc Networks

    Security is one of the most challenging aspects in the internet and network applications. Symmetric key algorithms are a typically efficient and fast cryptosystem, so it has significant applications in many realms. For a wireless ad hoc network with constraint computational resources, the cryptosystem based on symmetric key algorithms is...

    Provided By IRD India

  • White Papers // Nov 2013

    The Survey on Security for Smart Dust

    Smart dust motes, as networked computing devices continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design. However, due...

    Provided By IRD India

  • White Papers // Jul 2013

    Wi-Fi Infrastructure Security System from Vulnerable Attacks

    Wi-Fi is a very popular wireless technology which is powerful core for the global digital infrastructure. A device connected using Wi-Fi can access the network resource such as the Internet via a wireless network access point. Recent discoveries and initiatives highlight a simple fact that the core is just as...

    Provided By IRD India

  • White Papers // Jun 2013

    Secured Modified Bloom's Based Q-Composite Key Distribution for Wireless Sensor Networks

    The security issue in a Wireless Sensor Network (WSN) has been drawing considerable research attention in recent years. However Key management, a basic security service, becomes the core design for various security services, such as encryption and authentication. To increase the connectivity of each key in a large-scale WSN and...

    Provided By IRD India

  • White Papers // Nov 2013

    Mitigating Cloud Virtualization Vulnerabilities

    The main idea of cloud computing is to build a virtualized computing resource pool by centralizing abundant computing resources connected with network and present the service of infrastructure, platform and software. Cloud computing is introducing many huge changes to people's lifestyle and working pattern recently for its infinite benefits. However,...

    Provided By IRD India