Manipal Institute of Technology

Displaying 1-6 of 6 results

  • White Papers // Aug 2013

    Preprocessing and Secure Computations for Privacy Preservation Data Mining

    Privacy preserving data mining is very largely used for extracting knowledge from the data distributed over multiple sites without disclosing information. Dataset maintained by different organizations/sites involved in collaboration include missing, noisy, redundant and irrelevant data. Such data has to be preprocessed for obtaining efficient mining results from multiple sites....

    Provided By Manipal Institute of Technology

  • White Papers // Feb 2013

    Privacy Towards Base Station in Wireless Sensor Networks Against a Global Eavesdropper - A Survey

    In this paper, the authors analyze the existing techniques that are in wireless sensor networks. Privacy in wireless sensor networks is divided into two main categories. They are the data privacy and context privacy. This paper is with respect to the context privacy. Context privacy includes the contextual information that...

    Provided By Manipal Institute of Technology

  • White Papers // Dec 2012

    Prover and Verifier Based Password Protection: PVBPP

    In today's world password are mostly used for authentication. This makes them prone to various kinds of attacks like dictionary attacks. A dictionary attack is a method of breaking the password by systematically entering every word in a dictionary as a password. This attack leads to an overload on the...

    Provided By Manipal Institute of Technology

  • White Papers // Nov 2012

    Wireless Public key Infrastructure for Mobile Phones

    Mobile devices play an important role in the wireless network environment for providing different services over internet. The business transactions over wireless electronic devices are not secure and hence the messages are prone to be intercepted and modified by an intruder. So, devices supporting wireless internet must be guaranteed at...

    Provided By Manipal Institute of Technology

  • White Papers // Jun 2012

    Privacy Preserving and Ownership Authentication in Ubiquitous Computing Devices Using Secure Three Way Authentication

    In today's world of technology and gadgets almost every person is having a portable device, be it a laptop or the smart phones. The user would like to have all the services at his fingertips and access them through the portable device he owns. Maybe he wants some data from...

    Provided By Manipal Institute of Technology

  • White Papers // Mar 2012

    Optimistic Way of Accessing Open Storage Using Collaborative Approach

    Files are sent and delivered only if the Source-System and the Receiving-System is Switched-On. The system is on Client-Server architecture and not Peer-To-Peer. To provide Secured File-Transaction over the intranet and to ensure Data Availability, this is being achieved by constructing a virtual intranet over the Physical intranet. Accessing Open...

    Provided By Manipal Institute of Technology

  • White Papers // Feb 2013

    Privacy Towards Base Station in Wireless Sensor Networks Against a Global Eavesdropper - A Survey

    In this paper, the authors analyze the existing techniques that are in wireless sensor networks. Privacy in wireless sensor networks is divided into two main categories. They are the data privacy and context privacy. This paper is with respect to the context privacy. Context privacy includes the contextual information that...

    Provided By Manipal Institute of Technology

  • White Papers // Mar 2012

    Optimistic Way of Accessing Open Storage Using Collaborative Approach

    Files are sent and delivered only if the Source-System and the Receiving-System is Switched-On. The system is on Client-Server architecture and not Peer-To-Peer. To provide Secured File-Transaction over the intranet and to ensure Data Availability, this is being achieved by constructing a virtual intranet over the Physical intranet. Accessing Open...

    Provided By Manipal Institute of Technology

  • White Papers // Jun 2012

    Privacy Preserving and Ownership Authentication in Ubiquitous Computing Devices Using Secure Three Way Authentication

    In today's world of technology and gadgets almost every person is having a portable device, be it a laptop or the smart phones. The user would like to have all the services at his fingertips and access them through the portable device he owns. Maybe he wants some data from...

    Provided By Manipal Institute of Technology

  • White Papers // Nov 2012

    Wireless Public key Infrastructure for Mobile Phones

    Mobile devices play an important role in the wireless network environment for providing different services over internet. The business transactions over wireless electronic devices are not secure and hence the messages are prone to be intercepted and modified by an intruder. So, devices supporting wireless internet must be guaranteed at...

    Provided By Manipal Institute of Technology

  • White Papers // Aug 2013

    Preprocessing and Secure Computations for Privacy Preservation Data Mining

    Privacy preserving data mining is very largely used for extracting knowledge from the data distributed over multiple sites without disclosing information. Dataset maintained by different organizations/sites involved in collaboration include missing, noisy, redundant and irrelevant data. Such data has to be preprocessed for obtaining efficient mining results from multiple sites....

    Provided By Manipal Institute of Technology

  • White Papers // Dec 2012

    Prover and Verifier Based Password Protection: PVBPP

    In today's world password are mostly used for authentication. This makes them prone to various kinds of attacks like dictionary attacks. A dictionary attack is a method of breaking the password by systematically entering every word in a dictionary as a password. This attack leads to an overload on the...

    Provided By Manipal Institute of Technology