mecs-press

Displaying 41-80 of 342 results

  • White Papers // Nov 2013

    On Maxima Distribution of Full Differentials and Linear Hulls of Block Symmetric Ciphers

    The problem of determination of maxima distribution laws of full differentials and linear bias of block symmetric ciphers as substitution transformations is considered. Well-known theoretical results, published in literature, are given, as well as experiment results on making the laws of maxima distribution of full differential transitions and maximum biasess...

    Provided By mecs-press

  • White Papers // Nov 2013

    Empirical Analysis of Bagged SVM Classifier for Data Mining Applications

    Data mining is the use of algorithms to extract the information and patterns derived by the knowledge discovery in databases process. Classification maps data into predefined groups or classes. It is often referred to as supervised learning because the classes are determined before examining the data. The feasibility and the...

    Provided By mecs-press

  • White Papers // Oct 2013

    Collaborative Anti-jamming in Cognitive Radio Networks Using Minimax-Q Learning

    Cognitive radio is an efficient technique for realization of dynamic spectrum access. Since in the Cognitive Radio Network (CRN) environment, the Secondary Users (SUs) are susceptible to the random jammers, the security issue of the SU's channel access becomes crucial for the CRN framework. The rapidly varying spectrum dynamics of...

    Provided By mecs-press

  • White Papers // Oct 2013

    Study and Analysis of Text Steganography Tools

    Maintain the security of the secret information, this words has been a great challenge in the people day-to-day life. Sender can send messages regularly through a communication channel like Internet, draws the attention of third parties, hackers and crackers, perhaps causing attempts to break and expose the unusual messages. Steganography...

    Provided By mecs-press

  • White Papers // Oct 2013

    Performance Evaluation and Comparison of Network Firewalls Under DDoS Attack

    Network firewalls act as the first line of defense against unwanted and malicious traffic and also represent critical point of failure during DDoS attack. Predicting the overall firewall performance is crucial to network security administrators and designers in assessing the strength and effectiveness of network firewalls against DDoS attacks. In...

    Provided By mecs-press

  • White Papers // Oct 2013

    A Novel Minimized Computational Time Based Encryption and Authentication Using ECDSA

    Providing the security on the basis of encryption standards is considered as key challenges for achieving the integrity & confidentiality. There are three main public-key cryptosystem contenders. Each has a variable key size that can be increased to achieve higher security at the cost of slower cryptographic operations. The best...

    Provided By mecs-press

  • White Papers // Sep 2013

    Design and Development of Biometrics Secure Person Detection System for E-Passport Using Cryptographic Security Protocols

    The biometric passports are to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. This IC chip is integrated into the cover of a passport, called a biometric passport. Biometric Passports have been introduced in...

    Provided By mecs-press

  • White Papers // Sep 2013

    Security Mechanisms and Access Control Infrastructure for Biometrics Passport using Cryptographic Protocols

    Electronic passports (e-passports) are to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The e-passport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: cryptography security and...

    Provided By mecs-press

  • White Papers // Sep 2013

    Secluding Efficient Geographic Multicast Protocol against Multicast Attacks

    A Mobile Ad-hoc NETworks (MANETs) are composed of Mobile Nodes without any infrastructure. The network nodes in MANETs, not only act as ordinary network nodes but also as the routers for other peer devices. The dynamic topology, lack of a fixed infrastructure and the wireless nature make MANETs susceptible to...

    Provided By mecs-press

  • White Papers // Sep 2013

    Ontology Based Information Retrieval in Semantic Web: A Survey

    In present age of computers, there are various resources for gathering information related to given query like Radio Stations, Television, Internet and many more. Among them, Internet is considered as major factor for obtaining any information about a given domain. When a user wants to find some information, he/she enters...

    Provided By mecs-press

  • White Papers // Sep 2013

    Security Challenges and Attacks in Mobile Ad Hoc Networks

    Mobile Ad-hoc NETwork (MANET) is an autonomous collection of mobile nodes that form a temporary network without of any existing network infrastructure or central access point. The popularity of these networks created security challenges as an important issue. The traditional routing protocols perform well with dynamically changing topology but are...

    Provided By mecs-press

  • White Papers // Sep 2013

    A Compression & Encryption Algorithm on DNA Sequences Using Dynamic Look Up Table and Modified Huffman Techniques

    In this paper, the authors discussed a new DNA compression algorithm whose key idea is dynamic LUT. This compression algorithm gives a good model for compressing DNA sequences that reveals the true characteristics of DNA sequences. The compression results of dynamic LUT for DNA sequences also indicate that their method...

    Provided By mecs-press

  • White Papers // Aug 2013

    Design and Development MIPS Processor Based on a High Performance and Low Power Architecture on FPGA

    In this paper the authors present the design and development of a high performance and low power MIPS microprocessor and implementation on FPGA. In this method they for achieving high performance and low power in the operation of the proposed microprocessor use different methods including, unfolding transformation (parallel processing), C-slow...

    Provided By mecs-press

  • White Papers // Aug 2013

    Biometric Based Security Solutions for MANET: A Review

    Mobile ad hoc networks are self organizing, infrastructure-less, low power networks, design to deploy bandwidth-shared radio channel communication and to work under vulnerable environment. Security is primary concern in MANETs and in order to achieve high security (confidentiality, integrity, authentication, availability and non repudiation), several techniques have been explored in...

    Provided By mecs-press

  • White Papers // Aug 2013

    Next Generation Electronic Passport Scheme Using Cryptographic Authentication Protocols and Multiple Biometrics Technology

    Electronic passports (e-passports) are to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The e-passport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: cryptography security and...

    Provided By mecs-press

  • White Papers // Aug 2013

    A Face Recognition Approach Based on Entropy Estimate of the Nonlinear DCT Features in the Logarithm Domain Together With Kernel Entropy Component Analysis

    This paper exploits the feature extraction capabilities of the Discrete Cosine Transform (DCT) together with an illumination normalization approach in the logarithm domain that increase its robustness to variations in facial geometry and illumination. Secondly in the same domain the entropy measures are applied on the DCT coefficients so that...

    Provided By mecs-press

  • White Papers // Aug 2013

    Security Algorithms for Mitigating Selfish and Shared Root Node Attacks in MANETs

    Mobile ad hoc network is a type of self configurable, dynamic wireless network in which all the mobile devices are connected to one another without any centralized infrastructure. Since, the network topology of MANETs changes rapidly. It is vulnerable to routing attacks than any other infrastructure based wireless and wired...

    Provided By mecs-press

  • White Papers // Aug 2013

    KED - A Symmetric Key Algorithm for Secured Information Exchange Using Modulo 69

    Exchange of data over the internet is increasing day-by-day. Security is the main issue in communication over a network. Protection must be given against intruders. Hence, cryptography plays a vital role in providing security. There are two basic types of cryptography: symmetric key and asymmetric key. Symmetric key uses same...

    Provided By mecs-press

  • White Papers // Aug 2013

    A Hybrid Model for Biometric Authentication Using Finger Back Knuckle Surface Based on Angular Geometric Analysis

    Biometric based personal recognition is an efficient method for identifying a person. Recently, hand based biometric has become popular due to its various advantages such as high verification accuracy and high user acceptability. This paper proposes a hybrid model using an emerging hand based biometric trait known as Finger Back...

    Provided By mecs-press

  • White Papers // Jul 2013

    Networked Control System - A Survey

    Networked Control System (NCS) is a synthetic application which combines control science, computer science and network technology. It is a kind of feedback control systems wherein the control loops are closed through real time control network. NCS technology is applied in industry control system because of its simple structure, easy...

    Provided By mecs-press

  • White Papers // Jul 2013

    All-Optical Parity Circuits Using Nonlinear Directional Coupler

    Since in the previous existing optical designs, the electronic-optic-electronic conversion has not been completely eliminated. Construction of the optical circuits with nonlinear waveguides can overcome this drawback. The authors have developed a nonlinear directional coupler theory to describe novel all-optical parity circuits. By using three channels, appropriate adjusting of the...

    Provided By mecs-press

  • White Papers // Jul 2013

    Study and Performance Evaluation on Recent DDoS Trends of Attack & Defense

    Distributed Denial of Service attacks are exercised by attackers in various forms. These attacks vary from single attacking source to a networked attacking infrastructure. They also vary in degree of automation, from manual efforts to fully automated attacks. In networked form, a botnet of attacking sources is created. These machines...

    Provided By mecs-press

  • White Papers // Jul 2013

    A Survey on Interoperability in the Cloud Computing Environments

    In the recent years, cloud computing has been one of the top ten new technologies which provide various services such as software, platform and infrastructure for internet users. The cloud computing is a promising IT paradigm which enables the Internet evolution into a global market of collaborating services. In order...

    Provided By mecs-press

  • White Papers // Jul 2013

    A Scheme to Reduce Response Time in Cloud Computing Environment

    The area of cloud computing has become popular from the last decade due to its enormous benefits such as lower cost, faster development and access to highly available resources. Apart from these core benefits some challenges are also associated with it such as QoS, security, trust and better resource management....

    Provided By mecs-press

  • White Papers // Jun 2013

    Wi-Fi Networks Security and Accessing Control

    As wireless networks access gains popularity in corporate, private and personal networks, the nature of wireless networks opens up new possibilities for network attacks. This paper negotiating Wi-Fi security against scanning of rogue Wi-Fi networks and other related activities and considers the monitoring of Wi-Fi traffic effects. The unauthorized Access...

    Provided By mecs-press

  • White Papers // Jun 2013

    Service Oriented Architecture for Remote Sensing Satellite Telemetry Data Implemented on Cloud Computing

    This paper articulates how Service Oriented Architecture (SOA) and cloud computing together can facilitate technology setup in TeleMetry (TM) processing with a case study from the Egyptian Space Program (ESP) and a comparative study with Space Situational Awareness (SSA) program in European Space Agency (ESA), Moreover, this paper illustrates how...

    Provided By mecs-press

  • White Papers // Jun 2013

    Analysis of the SYN Flood DoS Attack

    The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol) segments when SYN flag is ON, which gives space for a DoS (Denial of Service) attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and...

    Provided By mecs-press

  • White Papers // Jun 2013

    Information Leakage Prevention Using Virtual Disk Drive

    The worst news for information technology people are computer has been stolen or lost. The actual problem is the loss of the data stored on the hard drive that can fall into the wrong hands. However, users of information system and laptops computers are facing real problems with due to...

    Provided By mecs-press

  • White Papers // Jun 2013

    Establishing Inter Vehicle Wireless Communication in Vanet and Preventing It From Hackers

    The entire humanity needs a vehicle to travel from one place to another. Obviously a new model vehicle is manufactured by the manufacturing companies to attract its customers every day. All the manufactured vehicles have different advantages, when compared with one another. In this paper, the authors introduce another added...

    Provided By mecs-press

  • White Papers // May 2013

    A Hybrid Algorithm for Privacy Preserving in Data Mining

    With the proliferation of information available in the internet and databases, the privacy-preserving data mining is extensively used to maintain the privacy of the underlying data. Various methods of the state art are available in the literature for privacy-preserving. Evolutionary Algorithms (EAs) provide effective solutions for various real-world optimization problems....

    Provided By mecs-press

  • White Papers // May 2013

    Bitwise Operations Related to a Combinatorial Problem on Binary Matrices

    Some techniques for the use of bitwise operations are described in the paper. As an example, an open problem of isomorphism-free generations of combinatorial objects is discussed. An equivalence relation on the set of square binary matrices having the same number of units in each row and each column is...

    Provided By mecs-press

  • White Papers // May 2013

    Performance Comparison of Various Robust Data Clustering Algorithms

    Robust clustering techniques are real life clustering techniques for noisy data. They work efficiently in the presence of noise. Fuzzy C-Means (FCM) is the first clustering algorithm, based upon fuzzy sets, proposed by 0but it does not give accurate results in the presence of noise. In this paper, FCM and...

    Provided By mecs-press

  • White Papers // May 2013

    An Efficient IBE Scheme using IFP and DDLP

    In this system, each user needs to visit a Private Key Generation (PKG) and identify him-self before joining a communication network. Once a user is accepted, the PKG will provide him with a secret key. In this way, if a user wants to communicate with others, he only needs to...

    Provided By mecs-press

  • White Papers // May 2013

    Secured and Optimized AODV for Wireless Sensor Networks

    Similar to conventional wireless networks, WSNs are based on multi hop routing to ensure connectivity and data forwarding which makes the routing service a challenging task due to the nature of sensors usually limited in memory, battery and computing capacities as well as the nature of the environment which is...

    Provided By mecs-press

  • White Papers // May 2013

    Exploiting SIMD Instructions in Modern Microprocessors to Optimize the Performance of Stream Ciphers

    Modern cryptographic protocols like TLS, SSL, etc. provide communication security by employing symmetric or secret key algorithms for encrypting the data and asymmetric or public key algorithms for key exchange. Modern microprocessors are loaded with a lot of performance optimization features. Single Instruction Multiple Data (SIMD) instruction set feature specially...

    Provided By mecs-press

  • White Papers // May 2013

    Student Learning Ability Assessment using Rough Set and Data Mining Approaches

    All learners are not able to learn anything and everything complete. Though the learning mode and medium are different in e-learning mode and in classroom learning, similar activities are required in both the modes for teachers to observe and assess the learner(s). Student performance varies considerably depending upon whether a...

    Provided By mecs-press

  • White Papers // Apr 2013

    Location Prediction of Mobility Management Using Soft Computing Techniques in Cellular Network

    This paper describes the neural network technique to solve location management problem. A multilayer neural model is designed to predict the future prediction of the subscriber based on the past predicted information of the subscriber. In this paper, a prediction based location management scheme is proposed for locating a mobile...

    Provided By mecs-press

  • White Papers // Apr 2013

    A Fair Downlink Scheduling Algorithm for 3GPP LTE Networks

    Long Term Evolution (LTE), the standard specified by 3GPP on the way towards the fourth generation mobile networks, is intended to deliver high speed data and multimedia services to next generation mobile users. The Radio Resource Management (RRM) plays a very crucial role in managing limited radio resources to enhance...

    Provided By mecs-press

  • White Papers // Apr 2013

    Password Hardened Biometric: A Complete Solution of Online Security

    In present paper, secure online access to enterprises resources is very important for any organization. To protect valuable data become one of the big challenge for today's business as enterprise customers or clients involved in Business-to-Customer (B2C) and Business-to-Business (B2B) e-commerce need to feel that their transactions are secured from...

    Provided By mecs-press

  • White Papers // Apr 2013

    A Robust Fault Detection Scheme for the Advanced Encryption Standard

    Fault attacks are powerful and efficient cryptanalysis techniques to find the secret key of the Advanced Encryption Standard (AES) algorithm. These attacks are based on injecting faults into the structure of the AES to obtain the confidential information. To protect the AES implementation against these attacks, a number of countermeasures...

    Provided By mecs-press

  • White Papers // Apr 2013

    Security Software Green Head for Mobile Devices Providing Comprehensive Protection From Malware and Illegal Activities of Cyber Criminals

    In this paper, the authors deal with the description of the threats to mobile devices and suggest the security software that provides comprehensive protection of personal data and mobile telephone from malware and illegal activity of cyber criminals. The developed security software Green Head protects personal Smartphone's of majority of...

    Provided By mecs-press

  • White Papers // Aug 2013

    Biometric Based Security Solutions for MANET: A Review

    Mobile ad hoc networks are self organizing, infrastructure-less, low power networks, design to deploy bandwidth-shared radio channel communication and to work under vulnerable environment. Security is primary concern in MANETs and in order to achieve high security (confidentiality, integrity, authentication, availability and non repudiation), several techniques have been explored in...

    Provided By mecs-press

  • White Papers // Sep 2013

    Design and Development of Biometrics Secure Person Detection System for E-Passport Using Cryptographic Security Protocols

    The biometric passports are to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. This IC chip is integrated into the cover of a passport, called a biometric passport. Biometric Passports have been introduced in...

    Provided By mecs-press

  • White Papers // Sep 2013

    Security Mechanisms and Access Control Infrastructure for Biometrics Passport using Cryptographic Protocols

    Electronic passports (e-passports) are to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The e-passport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: cryptography security and...

    Provided By mecs-press

  • White Papers // Oct 2012

    Empirical Network Performance Evaluation of Security Protocols on Operating Systems

    Securing data transmission is currently a widely researched topic. There are numerous facades in data security. Virtual Private Network (VPN) is one such strand that provides security for data that is in motion. Performance of a network that has VPN implementation is at the forefront of network design and choice...

    Provided By mecs-press

  • White Papers // Oct 2012

    Keywords Review of IT Security Literature in Recent 20 Years

    The volume of published scientific literature available on Internet has been increasing exponentially. Some of them reflect the latest achievement of the specific research domain. In recent years, many projects have been funded aiming to online scientific literature mining, especially in biomedical research. Scientific literature covers most of the hot...

    Provided By mecs-press

  • White Papers // Feb 2012

    Research of Network Security and Information Encryption

    With the continuous development of the computer network, the global information has become the general trend of development of human beings. But due to the connection of computer network structure with the diversity, terminal and non-uniformity of distribution network interconnection of openness, etc. In the process of rapid development of...

    Provided By mecs-press

  • White Papers // Oct 2012

    Analysis of Current Wireless Network Security

    Most threats against wireless networks involve an attacker with access to the radio link between wireless devices. Several of the threats listed in following rely on an attacker's ability to intercept and inject network communications. This highlights the most significant difference between protecting wireless and wired networks: the relative ease...

    Provided By mecs-press

  • White Papers // Aug 2012

    Proactive Security of E-Business

    Network security is a crucial problem in the construction of e-business. As the improvement of network openness, sharing and interconnection, the security problem is becoming more serious. After giving a brief statement to the theory of proactive security, based on the differences between passive defense and proactive security, the paper...

    Provided By mecs-press

  • White Papers // Oct 2009

    A Data-Fusion-Based Method for Intrusion Detection System in Networks

    Hackers' attacks are more and more intelligent, which makes it hard for single intrusion detection methods to attain favorable detection result. Therefore, many researchers have carried out how to combine multiple security measures to provide the network system more effective protection. However, so far none of those methods can achieve...

    Provided By mecs-press

  • White Papers // Sep 2012

    Constraint Based Periodicity Mining in Time Series Databases

    The search for the periodicity in time-series database has a number of application, is an interesting data mining problem. In real world dataset are mostly noisy and rarely a perfect periodicity, this problem is not trivial. Periodicity is very common practice in time series mining algorithms, since it is more...

    Provided By mecs-press

  • White Papers // Aug 2013

    Next Generation Electronic Passport Scheme Using Cryptographic Authentication Protocols and Multiple Biometrics Technology

    Electronic passports (e-passports) are to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The e-passport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: cryptography security and...

    Provided By mecs-press

  • White Papers // Apr 2013

    Performance of Personal Identification System Technique Using Iris Biometrics Technology

    The Iris identification as one of the significant techniques of biometric identification systems s and iris recognition algorithm is described. Biometric technology advances intellectual properties are wanted by many unauthorized personnel. As a result many researchers have being searching ways for more secure authentication methods for the user access. Iris...

    Provided By mecs-press

  • White Papers // Oct 2013

    Study and Analysis of Text Steganography Tools

    Maintain the security of the secret information, this words has been a great challenge in the people day-to-day life. Sender can send messages regularly through a communication channel like Internet, draws the attention of third parties, hackers and crackers, perhaps causing attempts to break and expose the unusual messages. Steganography...

    Provided By mecs-press

  • White Papers // Nov 2013

    Implementation of Palm Print Biometric Identification System Using Ordinal Measures

    Personal identification is one of the most important requirements in all e-commerce and criminal detection applications. In this framework, a novel palm print representation method, namely orthogonal line ordinal features, is proposed. The palm print registration, feature extraction, palm print verification and palm print recognition modules are designed to manage...

    Provided By mecs-press

  • White Papers // Nov 2013

    Goal Structured Requirement Engineering and Traceability Model for Data Warehouses

    Data warehouses are decision support systems that are specifically designed for the business managers and executives for reporting and business analysis. Data warehouse is a database that stores enterprise-wide data that can be used to deduce useful information. Business organizations can achieve a great level of competitive advantage by analyzing...

    Provided By mecs-press

  • White Papers // Nov 2013

    Improving Situational Awareness for Precursory Data Classification using Attribute Rough Set Reduction Approach

    The issue of correlating, integrating and presenting related information to issue early warning to impending natural disasters by categorizing documents with the aid of knowledge-based features leverages information cannot be deduced from the documents alone. This also involves query based search based on machine learning methods that improves the acquisition...

    Provided By mecs-press

  • White Papers // Sep 2013

    Secluding Efficient Geographic Multicast Protocol against Multicast Attacks

    A Mobile Ad-hoc NETworks (MANETs) are composed of Mobile Nodes without any infrastructure. The network nodes in MANETs, not only act as ordinary network nodes but also as the routers for other peer devices. The dynamic topology, lack of a fixed infrastructure and the wireless nature make MANETs susceptible to...

    Provided By mecs-press

  • White Papers // Sep 2013

    Ontology Based Information Retrieval in Semantic Web: A Survey

    In present age of computers, there are various resources for gathering information related to given query like Radio Stations, Television, Internet and many more. Among them, Internet is considered as major factor for obtaining any information about a given domain. When a user wants to find some information, he/she enters...

    Provided By mecs-press

  • White Papers // Aug 2013

    A Face Recognition Approach Based on Entropy Estimate of the Nonlinear DCT Features in the Logarithm Domain Together With Kernel Entropy Component Analysis

    This paper exploits the feature extraction capabilities of the Discrete Cosine Transform (DCT) together with an illumination normalization approach in the logarithm domain that increase its robustness to variations in facial geometry and illumination. Secondly in the same domain the entropy measures are applied on the DCT coefficients so that...

    Provided By mecs-press

  • White Papers // Jul 2013

    Study and Performance Evaluation on Recent DDoS Trends of Attack & Defense

    Distributed Denial of Service attacks are exercised by attackers in various forms. These attacks vary from single attacking source to a networked attacking infrastructure. They also vary in degree of automation, from manual efforts to fully automated attacks. In networked form, a botnet of attacking sources is created. These machines...

    Provided By mecs-press

  • White Papers // Jun 2013

    Service Oriented Architecture for Remote Sensing Satellite Telemetry Data Implemented on Cloud Computing

    This paper articulates how Service Oriented Architecture (SOA) and cloud computing together can facilitate technology setup in TeleMetry (TM) processing with a case study from the Egyptian Space Program (ESP) and a comparative study with Space Situational Awareness (SSA) program in European Space Agency (ESA), Moreover, this paper illustrates how...

    Provided By mecs-press

  • White Papers // May 2013

    An Efficient IBE Scheme using IFP and DDLP

    In this system, each user needs to visit a Private Key Generation (PKG) and identify him-self before joining a communication network. Once a user is accepted, the PKG will provide him with a secret key. In this way, if a user wants to communicate with others, he only needs to...

    Provided By mecs-press

  • White Papers // May 2013

    Secured and Optimized AODV for Wireless Sensor Networks

    Similar to conventional wireless networks, WSNs are based on multi hop routing to ensure connectivity and data forwarding which makes the routing service a challenging task due to the nature of sensors usually limited in memory, battery and computing capacities as well as the nature of the environment which is...

    Provided By mecs-press

  • White Papers // Apr 2013

    The Extensive Bit-level Encryption System (EBES)

    Due to the growing need to protect the confidentiality of information, there is a rising demand for an encryption algorithm that can protect data of every format, size and type. In this paper, the authors has been introduced the Extensive Bit-level Encryption System (EBES), a bit-level encryption mechanism. It is...

    Provided By mecs-press

  • White Papers // Apr 2013

    Semantic Multi-granular Lock Model for Object Oriented Distributed Systems

    In Object Oriented Distributed Systems (OODS), the objects are viewed as resources. Concurrency control techniques are usually applied on the database tier. This has the limitations of lack of support of legacy files and requirement of separate concurrency control mechanisms for each database model. Hence concurrency control on the objects...

    Provided By mecs-press

  • White Papers // Feb 2013

    Internet Passport Authentication System Using Multiple Biometric Identification Technology

    Electronic Passports (E-Passports) have known a wide and fast deployment all around the world since the International Civil Aviation Organization (ICAO) the world has adopted standards whereby passports can store biometric identifiers. The purpose of biometric passports is to prevent the illegal entry of traveler into a specific country and...

    Provided By mecs-press

  • White Papers // Feb 2013

    A Novel and Efficient Method for Protecting Internet Usage From Unauthorized Access Using Map Reduce

    The massive increases in data have paved a path for distributed computing, which in turn can reduce the data processing time. Though there are various approaches in distributed computing, Hadoop is one of the most efficient among the existing ones. Hadoop consists of different elements out of which Map Reduce...

    Provided By mecs-press

  • White Papers // Jan 2013

    Self-organized Detection of Relationships in a Network

    Multistate operations within a network result in high-dimensional, multivariate temporal data, and are useful for systems, which monitor access to network entities like resources, objects, etc. Efficient self organization of such multistate network operations stored in databases with respect to relationships amongst users or between a user and a data...

    Provided By mecs-press

  • White Papers // Nov 2012

    Performance Analysis of Most Common Encryption Algorithms on Different Web Browsers

    The hacking is the greatest problem in the Wireless Local Area Network (WLAN). Many algorithms like DES, 3DES, AES,UMARAM, RC6 and UR5 have been used to prevent the outside attacks to eavesdrop or prevent the data to be transferred to the end-user correctly. The authors have proposed a Web programming...

    Provided By mecs-press

  • White Papers // Sep 2013

    Security Challenges and Attacks in Mobile Ad Hoc Networks

    Mobile Ad-hoc NETwork (MANET) is an autonomous collection of mobile nodes that form a temporary network without of any existing network infrastructure or central access point. The popularity of these networks created security challenges as an important issue. The traditional routing protocols perform well with dynamically changing topology but are...

    Provided By mecs-press

  • White Papers // Sep 2012

    Anti-Spam Software for Detecting Information Attacks

    In this paper the development of anti-spam software detecting information attacks is offered. For this purpose it is considered spam filtration system with the multilayered, multivalent architecture, coordinating all ISP's in the country. All users and ISPs of this system involved in spam filtration process. After spam filtering process, saved...

    Provided By mecs-press

  • White Papers // Sep 2012

    An Efficient Approach to Genetic Algorithm for Task Scheduling in Cloud Computing Environment

    Cloud computing is recently a booming area and has been emerging as a commercial reality in the information technology domain. Cloud computing represents supplement, consumption and delivery model for IT services that are based on internet on pay as per usage basis. The scheduling of the cloud services to the...

    Provided By mecs-press

  • White Papers // Dec 2013

    Energy-Efficient Secure Directed Diffusion Protocol for Wireless Sensor Networks

    In wireless sensor networks, it is crucial to design and employ energy-efficient communication protocols, since nodes are battery-powered and thus their lifetimes are limited. Such constraints combined with a great number of applications used in these networks, pose many challenges (limited energy and low security) to the design and management...

    Provided By mecs-press

  • White Papers // Oct 2013

    Performance Evaluation and Comparison of Network Firewalls Under DDoS Attack

    Network firewalls act as the first line of defense against unwanted and malicious traffic and also represent critical point of failure during DDoS attack. Predicting the overall firewall performance is crucial to network security administrators and designers in assessing the strength and effectiveness of network firewalls against DDoS attacks. In...

    Provided By mecs-press

  • White Papers // Aug 2013

    Security Algorithms for Mitigating Selfish and Shared Root Node Attacks in MANETs

    Mobile ad hoc network is a type of self configurable, dynamic wireless network in which all the mobile devices are connected to one another without any centralized infrastructure. Since, the network topology of MANETs changes rapidly. It is vulnerable to routing attacks than any other infrastructure based wireless and wired...

    Provided By mecs-press

  • White Papers // Aug 2013

    KED - A Symmetric Key Algorithm for Secured Information Exchange Using Modulo 69

    Exchange of data over the internet is increasing day-by-day. Security is the main issue in communication over a network. Protection must be given against intruders. Hence, cryptography plays a vital role in providing security. There are two basic types of cryptography: symmetric key and asymmetric key. Symmetric key uses same...

    Provided By mecs-press

  • White Papers // Jun 2013

    Analysis of the SYN Flood DoS Attack

    The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol) segments when SYN flag is ON, which gives space for a DoS (Denial of Service) attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and...

    Provided By mecs-press

  • White Papers // May 2013

    Exploiting SIMD Instructions in Modern Microprocessors to Optimize the Performance of Stream Ciphers

    Modern cryptographic protocols like TLS, SSL, etc. provide communication security by employing symmetric or secret key algorithms for encrypting the data and asymmetric or public key algorithms for key exchange. Modern microprocessors are loaded with a lot of performance optimization features. Single Instruction Multiple Data (SIMD) instruction set feature specially...

    Provided By mecs-press

  • White Papers // Apr 2013

    Biometric Passport Validation Scheme using Radio Frequency Identification

    Biometric passports issued now-a-days have an embedded RFID chip that carries digitally signed biometric information. This RIFD chip is integrated into the cover of a passport, called a biometric passport. Electronic passports as it is sometimes called, represents a bold initiative in the deployment of two new technologies: RIFD and...

    Provided By mecs-press