Sardar Patel University

Displaying 1-5 of 5 results

  • White Papers // May 2013

    Performance Comparison of Discrete Hartley Transform (DHT) and Fast Fourier Transform (FFT) OFDM System in AWGN Channel

    In the current scenario so many advanced techniques are finding a way as a substitute for complex DFT - based OFDM system. One of such type of technique is Discrete Hartley Transform. The requirement of only real arithmetic computations for the proposed technique makes it more advantageous in terms of...

    Provided By Sardar Patel University

  • White Papers // Aug 2012

    Updating Attribute in CP-ABE: A New Approach

    In Ciphertext-Policy Attribute Based Encryption (CP-ABE), attributes are attached to the user's secret key and access policy is attached to the ciphertext. If attributes in the secret key of a user satisfy the policy then only the genuine user can decrypt the ciphertext. However, such scenario also necessitates periodic updating...

    Provided By Sardar Patel University

  • White Papers // Sep 2011

    Constant Ciphertext Length in CP-ABE

    Ciphertext Policy-Attribute Based Encryption (CP-ABE) is a technique in which user with secret key containing attributes, only able to decrypt the message if the attributes in the policy match with the attributes in secret key. The existing methods that use reasonably computable decryption policies produce the ciphertext of size at...

    Provided By Sardar Patel University

  • White Papers // Aug 2011

    A Novel Architecture for Intrusion Detection in Mobile Ad Hoc Network

    Today's wireless networks are vulnerable in many ways including illegal use, unauthorized access, denial of service attacks, eavesdropping so called war chalking. These problems are one of the main issues for wider uses of wireless network. On wired network intruder can access by wire but in wireless it has possibilities...

    Provided By Sardar Patel University

  • White Papers // Nov 2009

    Testing Various Similarity Metrics and Their Permutations With Clustering Approach in Context Free Data Cleaning

    Organizations can sustain growth in this knowledge era by proficient data analysis, which heavily relies on quality of data. This paper emphasizes on usage of sequence similarity metric with clustering approach in context free data cleaning to improve the quality of data by reducing noise. Authors propose an algorithm to...

    Provided By Sardar Patel University

  • White Papers // Sep 2011

    Constant Ciphertext Length in CP-ABE

    Ciphertext Policy-Attribute Based Encryption (CP-ABE) is a technique in which user with secret key containing attributes, only able to decrypt the message if the attributes in the policy match with the attributes in secret key. The existing methods that use reasonably computable decryption policies produce the ciphertext of size at...

    Provided By Sardar Patel University

  • White Papers // Aug 2012

    Updating Attribute in CP-ABE: A New Approach

    In Ciphertext-Policy Attribute Based Encryption (CP-ABE), attributes are attached to the user's secret key and access policy is attached to the ciphertext. If attributes in the secret key of a user satisfy the policy then only the genuine user can decrypt the ciphertext. However, such scenario also necessitates periodic updating...

    Provided By Sardar Patel University

  • White Papers // May 2013

    Performance Comparison of Discrete Hartley Transform (DHT) and Fast Fourier Transform (FFT) OFDM System in AWGN Channel

    In the current scenario so many advanced techniques are finding a way as a substitute for complex DFT - based OFDM system. One of such type of technique is Discrete Hartley Transform. The requirement of only real arithmetic computations for the proposed technique makes it more advantageous in terms of...

    Provided By Sardar Patel University

  • White Papers // Nov 2009

    Testing Various Similarity Metrics and Their Permutations With Clustering Approach in Context Free Data Cleaning

    Organizations can sustain growth in this knowledge era by proficient data analysis, which heavily relies on quality of data. This paper emphasizes on usage of sequence similarity metric with clustering approach in context free data cleaning to improve the quality of data by reducing noise. Authors propose an algorithm to...

    Provided By Sardar Patel University

  • White Papers // Aug 2011

    A Novel Architecture for Intrusion Detection in Mobile Ad Hoc Network

    Today's wireless networks are vulnerable in many ways including illegal use, unauthorized access, denial of service attacks, eavesdropping so called war chalking. These problems are one of the main issues for wider uses of wireless network. On wired network intruder can access by wire but in wireless it has possibilities...

    Provided By Sardar Patel University