Sardar Vallabhbhai National Institute Of Technology

Displaying 1-6 of 6 results

  • White Papers // Dec 2011

    A Novel Approach for e-Payment Using Virtual Password System

    In today's world of E-Commerce everything comes online like Music,E-Books, Shopping all most everything is online. If the people are using some service or buying things online then one have to pay for that. For that one have to do Net Banking or one have to use Credit card which...

    Provided By Sardar Vallabhbhai National Institute Of Technology

  • White Papers // Nov 2011

    Implimentation of Cryptographic Algorithm for GSM and UMTS Systems

    Due to extremely high demand of mobile phones among people, over the years there has been a great demand for the support of various applications and security services. Cryptographic algorithms used by Mobile Subscribers to protect the privacy of their cellular voice and data communication. Ciphering provides the mean to...

    Provided By Sardar Vallabhbhai National Institute Of Technology

  • White Papers // Sep 2011

    Prevention of Wormhole Attack in Wireless Sensor Network

    Ubiquitous and pervasive applications, where the Wireless Sensor Networks are typically deployed, lead to the susceptibility to many kinds of security attacks. Sensors used for real time response capability also make it difficult to devise the resource intensive security protocols because of their limited battery, power, memory and processing capabilities....

    Provided By Sardar Vallabhbhai National Institute Of Technology

  • White Papers // May 2011

    Techniques for Efficient Routing in Wireless Sensor Network

    Wireless Sensor Network (WSN) is a tiny sensor device about a cubic size having sensors and small battery, which enables applications that connect the physical world with pervasive networks. These sensor devices do not only have the ability to communicate information across the sensor network, but also to cooperate in...

    Provided By Sardar Vallabhbhai National Institute Of Technology

  • White Papers // Mar 2011

    A Secure Email Login System Using Virtual Password

    In today's world password compromise by some adversaries is common for different purpose. In ICC 2008 Lei et al. proposed a new user authentication system based on the virtual password system. In virtual password system they have used linear randomized function to be secure against identity theft attacks, phishing attacks,...

    Provided By Sardar Vallabhbhai National Institute Of Technology

  • White Papers // Apr 2010

    A Survey of Mobile WiMAX IEEE 802.16m Standard

    IEEE 802.16m amends the IEEE 802.16 Wireless MAN-OFDMA specification to provide an advanced air interface for operation in licensed bands. It will meet the cellular layer requirements of IMT-Advanced next generation mobile networks. It will be designed to provide significantly improved performance compared to other high rate broadband cellular network...

    Provided By Sardar Vallabhbhai National Institute Of Technology

  • White Papers // Mar 2011

    A Secure Email Login System Using Virtual Password

    In today's world password compromise by some adversaries is common for different purpose. In ICC 2008 Lei et al. proposed a new user authentication system based on the virtual password system. In virtual password system they have used linear randomized function to be secure against identity theft attacks, phishing attacks,...

    Provided By Sardar Vallabhbhai National Institute Of Technology

  • White Papers // Sep 2011

    Prevention of Wormhole Attack in Wireless Sensor Network

    Ubiquitous and pervasive applications, where the Wireless Sensor Networks are typically deployed, lead to the susceptibility to many kinds of security attacks. Sensors used for real time response capability also make it difficult to devise the resource intensive security protocols because of their limited battery, power, memory and processing capabilities....

    Provided By Sardar Vallabhbhai National Institute Of Technology

  • White Papers // Dec 2011

    A Novel Approach for e-Payment Using Virtual Password System

    In today's world of E-Commerce everything comes online like Music,E-Books, Shopping all most everything is online. If the people are using some service or buying things online then one have to pay for that. For that one have to do Net Banking or one have to use Credit card which...

    Provided By Sardar Vallabhbhai National Institute Of Technology

  • White Papers // Nov 2011

    Implimentation of Cryptographic Algorithm for GSM and UMTS Systems

    Due to extremely high demand of mobile phones among people, over the years there has been a great demand for the support of various applications and security services. Cryptographic algorithms used by Mobile Subscribers to protect the privacy of their cellular voice and data communication. Ciphering provides the mean to...

    Provided By Sardar Vallabhbhai National Institute Of Technology

  • White Papers // May 2011

    Techniques for Efficient Routing in Wireless Sensor Network

    Wireless Sensor Network (WSN) is a tiny sensor device about a cubic size having sensors and small battery, which enables applications that connect the physical world with pervasive networks. These sensor devices do not only have the ability to communicate information across the sensor network, but also to cooperate in...

    Provided By Sardar Vallabhbhai National Institute Of Technology

  • White Papers // Apr 2010

    A Survey of Mobile WiMAX IEEE 802.16m Standard

    IEEE 802.16m amends the IEEE 802.16 Wireless MAN-OFDMA specification to provide an advanced air interface for operation in licensed bands. It will meet the cellular layer requirements of IMT-Advanced next generation mobile networks. It will be designed to provide significantly improved performance compared to other high rate broadband cellular network...

    Provided By Sardar Vallabhbhai National Institute Of Technology