Science Productions

Displaying 1-40 of 68 results

  • White Papers // Jan 2014

    Security Breach in Trading System-Countermeasure Using IPTraceback

    Recently, economic scenario is often facing security breach that has heavy impact on the financial soundness of a company particularly, stock prices on firms. The utmost consequence being the whole business comes to a standstill. From the estimates attributed by the financial sector, it has been inferred that the loss...

    Provided By Science Productions

  • White Papers // Dec 2013

    A New Cloud Based Supervisory Control and Data Acquisition Implementation to Enhance the Level of Security Using Testbed

    Now-a-days, cloud computing is an important and hot topic in arena of information technology and computer system. Several companies and educational institutes have been deployed cloud infrastructures to overcome their problems such as easy data access, software updates with minimal cost, large or unlimited storage, efficient cost factor, backup storage...

    Provided By Science Productions

  • White Papers // Dec 2013

    Server Failures Enabled Javaspaces Service

    Machine crashes and network partintions are major problems while running a distributed application. It is important to deal with failures that are caused by such events within runtime. Otherwise, it will be a must to restart the application from the beginning. A possible solution to this problem is to introduce...

    Provided By Science Productions

  • White Papers // Dec 2013

    Evaluation of Service Transactions and Selection of Quality Offered Services in a Business Environment

    The application of service oriented architecture in business is to meet the best quality requirements to the customers and providers. Where, service evaluations are carried out based on the quality attributes of scalability, usability, security, performance. In past many evaluation systems have been proposed for business applications with different criteria....

    Provided By Science Productions

  • White Papers // Dec 2013

    Cluster Based Cache Consistency Using Agent Technique in Mobile Environment

    Caching is an essential mechanism in mobile environment. Mobile node makes access dynamic changing data object to their server and to get the interested data to keep their own as local copies in the cache. If the server database is updated, the data cached in mobile client is invalidated and...

    Provided By Science Productions

  • White Papers // Dec 2013

    An Algorithm for Mining Usable Rules Using a Holistic Swarm Based Approach

    Evolutionary algorithms are capable of finding near optimal solutions to problems which are intractable to solve using conventional methods. One such problem is to accurately classify patients using rule mining methodology while controlling the size of output rules. A massive amount of data pertaining to medicine is generated and recorded...

    Provided By Science Productions

  • White Papers // Dec 2013

    Partial Rule Match for Filtering Rules in Associative Classification

    In this paper, the authors propose a new method to enhance the accuracy of Modified Multi-class Classification based on Association Rule (MMCAR) classifier. They introduce a Partial Rule Match Filtering (PRMF) method that allows a minimal match of the items in the rule's body in order for the rule to...

    Provided By Science Productions

  • White Papers // Nov 2013

    Permutation of HTTPI and HTTPS in Web Services Against Attacks for Security Enhancement

    The Hyper Text Transfer Protocol (HTTP) protocol plays a vital role in Web Services Security. Though the HTTPs provide excellent security, they are not flexible enough to allow caches. HTTPi provides high integrity and low security whereas HTTPs provide low integrity and high security. The goal of WS activity is...

    Provided By Science Productions

  • White Papers // Nov 2013

    Optimizing Batch Rekeying Interval for Secure Group Communication Based on Queuing Model

    Rapid growth of Internet spawns many group oriented multicast applications like internet pay TV, news dissemination and stock quote system. The fortes of these applications are the support of dynamic, scalable group membership and group members are geographically divergent. As members of the group move in and out, an imperative...

    Provided By Science Productions

  • White Papers // Nov 2013

    Design and Implementation of a Privacy Preserved Off-Premises Cloud Storage

    Despite several cost-effective and flexible characteristics of cloud computing, some clients are reluctant to adopt this paradigm due to emerging security and privacy concerns. Organization such as healthcare and payment card industry where confidentiality of information is a vital act, are not assertive to trust the security techniques and privacy...

    Provided By Science Productions

  • White Papers // Nov 2013

    An Approach to Mitigate Denial of Service Attacks in IEEE 802.11 Networks

    Wireless networks are widely deployed and have many uses, for example in critical embedded systems. The applications of this kind of network meets the common needs of most embedded systems and addressing the particularities of each scenario, such as limitations of computing resources and energy supply. Problems such as denial...

    Provided By Science Productions

  • White Papers // Nov 2013

    Protecting the Online User's Information Against Phishing Attacks Using Dynamic Encryption Techniques

    A phishing attack is a criminal activity which mimics a certain legitimate webpage using a fake webpage with an intention of luring end-users to visit the fake website thereby stealing their personal information such as usernames, passwords and other personal details such as credit card information. Phishing has seen an...

    Provided By Science Productions

  • White Papers // Nov 2013

    Combating Cyber Terrorism-Assessment of Log for Malicious Signatures

    Enhancing security to the networks and preventing the cyber attacks is a major issue in all domains. In this paper, a new class of cyber terrorism is addressed where mischievous and malicious behavior is the root cause for the modification of network data stored in an open database. An attempt...

    Provided By Science Productions

  • White Papers // Nov 2013

    Critical Review of Openstack Security: Issues and Weaknesses

    In this paper, the authors examine the state of both cloud computing security in general and OpenStack in particular. Conducting a reassessment of cloud computing security can provide a greater understanding of how cloud computing functions and what types of security issues arise therein. This paper is divided into two...

    Provided By Science Productions

  • White Papers // Nov 2013

    Research on Security Protocol for Collaborating Mobile Agents in Network Intrusion Detection Systems

    Despite the popularity of mobile agents in academic and commercial arena, the security issues associated with them have hindered their adoption on large scale distributed applications. However, researchers are making relentless effort to overcome the security impediments so that the interesting properties inherent in mobile agent application, especially in the...

    Provided By Science Productions

  • White Papers // Oct 2013

    Effective Black Hole Attacks in MANETs

    Black hole or packet drop attack is a denial of service attack on routing protocols in which malicious nodes fabricate routing information, attract packets routed through them and then deliberately drop these packets. Most of the black hole attack simulations are performed by constantly fabricating routing information and thus consistently...

    Provided By Science Productions

  • White Papers // Oct 2013

    An In-Depth Analysis on Integrating Campus Radio Frequency Identification System on Clouds for Enhancing Security

    Several measures had been taken to ameliorate security technology at campuses using latest technologies available. Radio Frequency IDentification (RFID) technology in campuses is mainly used for recording attendance which is further extended to activity monitoring and individual security. This paper proposes a framework of RFID integrated solution for enhanced campus...

    Provided By Science Productions

  • White Papers // Oct 2013

    Smart Travelling with Radio Frequency Identification

    Radio Frequency IDentification (RFID) technology is being widely used now-a-days and is becoming more popular with every passing day. There are varied applications of this technology in various fields such as industry, communication, travel and transportation. Roads, rail ways, air traffic and container vessel shipping all share underlying abstractions of...

    Provided By Science Productions

  • White Papers // Oct 2013

    Performance Evaluation of Wormhole Security Approaches for Ad-Hoc Networks

    Ad-hoc networks are talented but are exposed to the risk of wormhole attacks. However, a wormhole attack can be mounted easily and forms stern menaces in networks, particularly against various ad-hoc wireless networks. The wormhole attack distorts the network topology and decrease the network systems performance. Therefore, identifying the possibility...

    Provided By Science Productions

  • White Papers // Oct 2013

    Deteriorating Distributed Denial of Service Attack by Recovering Zombies Using Penalty Scheme

    Resource of victim impounded by DDoS attack leads the victim to series monetary loss apart from various other ill-effects. Already lot of solutions came up in technological aspects almost neglecting the economical aspects. Hence, there is not yet a proper method to make the zombies accountable to the economical loss...

    Provided By Science Productions

  • White Papers // Oct 2013

    Design of a Dual Keyboard

    The design of a computer keyboard with dual function is proposed. This computer keyboard called Dual Keyboard can function both as a normal keyboard and as a pressure sensitive keyboard. The proposed device has a switch that decides the function. The keyboard makes use of sensors placed beneath the keys...

    Provided By Science Productions

  • White Papers // Oct 2013

    A Novel Approach for Information Security in Ad Hoc Networks Through Secure Key Management

    Ad hoc networks provide flexible and adaptive networks with no fixed infrastructure and dynamic topology. Owe to the vulnerability nature of ad hoc network, there are lots of security threats that diminish the development of ad hoc networks. Therefore, to provide security for information of users and to preserve their...

    Provided By Science Productions

  • White Papers // Sep 2013

    Study and Analysis of Routing Protocols in Mobile Ad-Hoc Network

    Mobile Ad-hoc NETworks (MANETs) is a network without a fixed Infrastructure. In wireless networks users expect to get access to the network security and to exchange information anytime and anywhere. The ad hoc wireless network consists of mobile networks which creates architecture for communication without the help of traditional fixed-position...

    Provided By Science Productions

  • White Papers // Sep 2013

    Lightweight Vigilant Procedure to Implement Security Measures in Highly Roving Military Operations

    The performance of Mobile Ad-hoc NETwork (MANET) becomes questionable in highly roving and mission critical application like military operation. Security measures like encryption, authentication, digital signature has been proposed for MANET. However, all those mechanisms need some kind of static infrastructure and it is extremely difficult to implement such an...

    Provided By Science Productions

  • White Papers // Aug 2013

    Message Authentication Code Based Secure Group Key Management Protocol for Mobile Ad Hoc Networks

    A mobile ad hoc network is a group of nodes which are communicating with each other with the use of radio frequencies. When there is high movement of mobile nodes, the nodes find difficult to reach other nodes. If the data are exchanged between nodes when there is high mobility,...

    Provided By Science Productions

  • White Papers // Aug 2013

    An Efficient Autonomous Key Management with Reduced Communication/Computation Costs in Mobile Ad Hoc Network

    A primary concern in Mobile Ad-hoc NETworks (MANETs) is security. Secret sharing is an effective way to distribute a secret among n parties, where each party holds one piece of the secret. A number of key management schemes have been proposed for MANETs. However, the secret sharing to control key...

    Provided By Science Productions

  • White Papers // Jul 2013

    A Role of Intrusion Detection System for Wireless LAN Using Various Schemes and Related Issues

    The advancement in network based technology and augmented dependability of the people everyday life on this technology. During recent years, number of attacks on networks has intensely increased. Hence interest in network intrusion detection has increased among the researchers. This study assesses different kinds of IDS and inclines preemptive procedures....

    Provided By Science Productions

  • White Papers // Jul 2013

    Development of an Energyefficient, Secure and Reliable Wireless Sensor Networks Routing Protocol Based on Data Aggregation and User Authentication

    Data aggregation protocols are required in Wireless Sensor Networks (WSNs) to improve the data accuracy and extend the network lifetime by reducing the energy consumption. The existing Data Aggregation-Optimal LEACH (DAO-LEACH) protocol for WSN is enhanced in terms of security and fault-tolerance based on Gracefully Degraded Data Aggregation (GDDA) to...

    Provided By Science Productions

  • White Papers // Jul 2013

    The Dynamic Nonce Based Authentication Scheme to Defend Intermediary Attack for Web Services

    Now-a-days, web services have used drastically for various online applications like banking, e-bill processing. All online services need robust security architecture for handling sensitive data like user name, password. But, the web service has security problems that need to be solved. The existing security scheme lacks to defend the attacks...

    Provided By Science Productions

  • White Papers // May 2013

    Performance Improvement in Cloud Computing Using Resource Clustering

    Cloud computing is a computing paradigm in which the various tasks are assigned to a combination of connections, software and services that can be accessed over the network. The computing resources and services can be efficiently delivered and utilized, making the vision of computing utility realizable. In various applications, execution...

    Provided By Science Productions

  • White Papers // May 2013

    Evaluation Metrics for Wireless Sensor Network Security: Algorithms Review and Software Tool

    Wireless Sensor Networks (WSN) is currently receiving a significant attention due to their potential impact into several real life applications such as military and home automation technology. This paper is a complementary part of what's discussed. In this paper, the authors propose a software tool to simulate and evaluate the...

    Provided By Science Productions

  • White Papers // May 2013

    Protocols for Secure Routing and Transmission in Mobile Ad Hoc Network: A Review

    Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability...

    Provided By Science Productions

  • White Papers // May 2013

    Secured Routing with Authentication in Mobile Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes that dynamically forms a temporary network without any fixed infrastructure. Each node participates in the ad hoc routing protocol that helps it to discover multi-hop paths through the network to any node. Security challenges have become a primary...

    Provided By Science Productions

  • White Papers // May 2013

    Research Proposal: An Intrusion Detection System Alert Reduction and Assessment Framework Based on Data Mining

    The Intrusion Detection System (IDS) generates huge amounts of alerts that are mostly false positives. The abundance of false positive alerts makes it difficult for the security analyst to identify successful attacks and to take remedial actions. Such alerts to have not been classified in accordance with their degree of...

    Provided By Science Productions

  • White Papers // Apr 2013

    A Framework for Simple Object Access Protocol Messages to Detect Expansion Attacks for Secure Webservice

    The world has shrunk in this internet era. the applications in the internet use xml and web services which are simple, but powerful standards that enable applications to more efficiently communicate with each other. Unfortunately this advantage is coupled with concerns of web services security. All the services provided by...

    Provided By Science Productions

  • White Papers // Apr 2013

    A Model for Securing Sharing Information Across the Supply Chain

    Supply Chain Management (SCM) is impacted by information technology both directly or indirectly. Sharing information across the supply chain not only supports internal operations but also collaboration among supply partners. So, securing information has a critical role in creating confidence in organizations to share their data across the supply chain....

    Provided By Science Productions

  • White Papers // Apr 2013

    Comparative Study of Scheduling Al-Gorithms in Cloud Computing Environment

    An essential requirement in cloud computing environment is scheduling the current jobs to be executed with the given constraints. The scheduler should order the jobs in a way where balance between improving the quality of services and at the same time maintaining the efficiency and fairness among the jobs. Thus,...

    Provided By Science Productions

  • White Papers // Apr 2013

    Home Users Security and the Web Browser Inbuilt Settings, Framework to Setup It Automatically

    The authors are living in the electronic age where electronic transactions such as e-mail, e-banking, e-commerce and e-learning becoming more and more prominent. To access online for this services, the web browser is today's almost unique software used. These days' hackers know that browsers are installed into all computers and...

    Provided By Science Productions

  • White Papers // Feb 2013

    Flooding Attack Aware Secure AODV

    Providing security in a Mobile Ad-hoc NETwork (MANET) is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS) attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth....

    Provided By Science Productions

  • White Papers // Feb 2013

    Performance Evaluation of Chaotic Encryption Technique

    Drastic growth in multimedia communication resulted to numerous security issues in the transmission of data. Moreover, the network used for the digital communication does not provide much security for the data transfer. During this time, tens of millions people using the internet options for essential communication and is being a...

    Provided By Science Productions

  • White Papers // Nov 2013

    Protecting the Online User's Information Against Phishing Attacks Using Dynamic Encryption Techniques

    A phishing attack is a criminal activity which mimics a certain legitimate webpage using a fake webpage with an intention of luring end-users to visit the fake website thereby stealing their personal information such as usernames, passwords and other personal details such as credit card information. Phishing has seen an...

    Provided By Science Productions

  • White Papers // Jul 2013

    The Dynamic Nonce Based Authentication Scheme to Defend Intermediary Attack for Web Services

    Now-a-days, web services have used drastically for various online applications like banking, e-bill processing. All online services need robust security architecture for handling sensitive data like user name, password. But, the web service has security problems that need to be solved. The existing security scheme lacks to defend the attacks...

    Provided By Science Productions

  • White Papers // Nov 2013

    Combating Cyber Terrorism-Assessment of Log for Malicious Signatures

    Enhancing security to the networks and preventing the cyber attacks is a major issue in all domains. In this paper, a new class of cyber terrorism is addressed where mischievous and malicious behavior is the root cause for the modification of network data stored in an open database. An attempt...

    Provided By Science Productions

  • White Papers // May 2013

    Research Proposal: An Intrusion Detection System Alert Reduction and Assessment Framework Based on Data Mining

    The Intrusion Detection System (IDS) generates huge amounts of alerts that are mostly false positives. The abundance of false positive alerts makes it difficult for the security analyst to identify successful attacks and to take remedial actions. Such alerts to have not been classified in accordance with their degree of...

    Provided By Science Productions

  • White Papers // Oct 2013

    Deteriorating Distributed Denial of Service Attack by Recovering Zombies Using Penalty Scheme

    Resource of victim impounded by DDoS attack leads the victim to series monetary loss apart from various other ill-effects. Already lot of solutions came up in technological aspects almost neglecting the economical aspects. Hence, there is not yet a proper method to make the zombies accountable to the economical loss...

    Provided By Science Productions

  • White Papers // Jan 2013

    Privacy Preservation for File Sharing Scheme Using Secured File Block ID with Binary Trees

    Privacy, the security of information from unauthorized access is gradually needed on the Internet and yet progressively more important while each user acts as both consumer and producer. The lack of privacy is mainly employed for peer-to peer file sharing applications, in which users in the network shared file with...

    Provided By Science Productions

  • White Papers // Aug 2013

    An Efficient Autonomous Key Management with Reduced Communication/Computation Costs in Mobile Ad Hoc Network

    A primary concern in Mobile Ad-hoc NETworks (MANETs) is security. Secret sharing is an effective way to distribute a secret among n parties, where each party holds one piece of the secret. A number of key management schemes have been proposed for MANETs. However, the secret sharing to control key...

    Provided By Science Productions

  • White Papers // Jul 2013

    A Role of Intrusion Detection System for Wireless LAN Using Various Schemes and Related Issues

    The advancement in network based technology and augmented dependability of the people everyday life on this technology. During recent years, number of attacks on networks has intensely increased. Hence interest in network intrusion detection has increased among the researchers. This study assesses different kinds of IDS and inclines preemptive procedures....

    Provided By Science Productions

  • White Papers // Apr 2013

    A Model for Securing Sharing Information Across the Supply Chain

    Supply Chain Management (SCM) is impacted by information technology both directly or indirectly. Sharing information across the supply chain not only supports internal operations but also collaboration among supply partners. So, securing information has a critical role in creating confidence in organizations to share their data across the supply chain....

    Provided By Science Productions

  • White Papers // Oct 2013

    Effective Black Hole Attacks in MANETs

    Black hole or packet drop attack is a denial of service attack on routing protocols in which malicious nodes fabricate routing information, attract packets routed through them and then deliberately drop these packets. Most of the black hole attack simulations are performed by constantly fabricating routing information and thus consistently...

    Provided By Science Productions

  • White Papers // Nov 2013

    An Approach to Mitigate Denial of Service Attacks in IEEE 802.11 Networks

    Wireless networks are widely deployed and have many uses, for example in critical embedded systems. The applications of this kind of network meets the common needs of most embedded systems and addressing the particularities of each scenario, such as limitations of computing resources and energy supply. Problems such as denial...

    Provided By Science Productions

  • White Papers // May 2013

    Secured Routing with Authentication in Mobile Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes that dynamically forms a temporary network without any fixed infrastructure. Each node participates in the ad hoc routing protocol that helps it to discover multi-hop paths through the network to any node. Security challenges have become a primary...

    Provided By Science Productions

  • White Papers // Jan 2014

    Security Breach in Trading System-Countermeasure Using IPTraceback

    Recently, economic scenario is often facing security breach that has heavy impact on the financial soundness of a company particularly, stock prices on firms. The utmost consequence being the whole business comes to a standstill. From the estimates attributed by the financial sector, it has been inferred that the loss...

    Provided By Science Productions

  • White Papers // Nov 2013

    Optimizing Batch Rekeying Interval for Secure Group Communication Based on Queuing Model

    Rapid growth of Internet spawns many group oriented multicast applications like internet pay TV, news dissemination and stock quote system. The fortes of these applications are the support of dynamic, scalable group membership and group members are geographically divergent. As members of the group move in and out, an imperative...

    Provided By Science Productions

  • White Papers // Dec 2013

    A New Cloud Based Supervisory Control and Data Acquisition Implementation to Enhance the Level of Security Using Testbed

    Now-a-days, cloud computing is an important and hot topic in arena of information technology and computer system. Several companies and educational institutes have been deployed cloud infrastructures to overcome their problems such as easy data access, software updates with minimal cost, large or unlimited storage, efficient cost factor, backup storage...

    Provided By Science Productions

  • White Papers // Dec 2013

    Evaluation of Service Transactions and Selection of Quality Offered Services in a Business Environment

    The application of service oriented architecture in business is to meet the best quality requirements to the customers and providers. Where, service evaluations are carried out based on the quality attributes of scalability, usability, security, performance. In past many evaluation systems have been proposed for business applications with different criteria....

    Provided By Science Productions

  • White Papers // Nov 2011

    Impact of Malicious Nodes Under Different Route Refresh Intervals in Ad Hoc Network

    Ad hoc networks are formed dynamically by group of mobile devices co operating with each other. Intermediate nodes between source and destination act as routers so that source node can communicate with the destination node even if it is out radio range and thus eliminating the necessity of infrastructure. Co...

    Provided By Science Productions

  • White Papers // Aug 2012

    Optimization Techniques to Record Deduplication

    Duplicate record detection is important for data preprocessing and cleaning. Artificial Bee Colony (ABC) is one of the most recently introduced algorithms based on the intelligent foraging behavior of a honey bee swarm. The authors' approach to duplicate detection is the use of ABC algorithm for generating the optimal similarity...

    Provided By Science Productions

  • White Papers // Aug 2012

    Fuzzy Cost Enabled Cluster Based Multipath Routing Algorithm for Mobile Ad-Hoc Networks

    This paper proposes the selection of best paths in Mobile Ad Hoc NETwork (MANET) based on multipath routing with fuzzy cost in respect of the Fuzzy Cost Enabled Cluster based Routing (FCECR). By implementing FCECR, they have made changes to reduce the cost and route discovery overhead for the selection...

    Provided By Science Productions

  • White Papers // Sep 2012

    Principal Component Analysis Based Feature Extraction, Morphological Edge Detection and Localization for Fast Iris Recognition

    This paper involves the Iris Localization based on morphological or set theory which is well in shape detection. Principal Component Analysis (PCA) is used for preprocessing, in which the removal of redundant and unwanted data is done. Applications such as Median Filtering and Adaptive thresholding are used for handling the...

    Provided By Science Productions

  • White Papers // Aug 2012

    Reconfigurable Hardware Architecture for Network Intrusion Detection System

    Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention. The use of reconfigurable hardware for network security applications has great strides as Field Programmable Gate Array (FPGA) devices have provided larger and faster resources. This proposes architecture called "BV-TCAM" is presented, which is implemented for an FPGA-based Network...

    Provided By Science Productions

  • White Papers // Jul 2012

    A Metadata Based Storage Model for Securing Data in Cloud Environment

    Enterprises are migrating to the cloud environment at a faster pace. Security of information that is being processed by the applications and ultimately getting stored in the data centers are of big concerns of this newly evolving environment. The security of the data is a concern not only during transferring...

    Provided By Science Productions

  • White Papers // Dec 2011

    Supporting Best Practices and Standards for Information Technology Infrastructure Library

    There are several IT best practices and IT standards, which are independently supporting enterprises. Some of them have similarities and other differ from each other. This paper discusses these best practices and standards in contrast with ITIL. CMMI, CobiT, eTOM, ISO 9000, ISO/IEC 17799, Malcolm Baldrige and Six Sigma will...

    Provided By Science Productions

  • White Papers // Nov 2010

    Integrated Quantum and Classical Key Scheme for Two Servers Password Authentication

    The two-server password authentication architecture presented has control server and service server. The control server is controlled by a passive adversary while the service server is controlled by an active adversary. A single point of vulnerability, as in the existing password systems, is totally eliminated. Work with today's peer to...

    Provided By Science Productions

  • White Papers // Jan 2006

    An Enhanced Secure and Scalable Model for Enterprise Applications Using Automated Monitoring

    E-Business must be highly secured and scalable to provide efficient services to millions of clients on the web. This paper proposes a new approach based on shared objects to improve security and mobile agents to improve scalability. The e-business uses shared objects and mobile agents to update the clients automatically...

    Provided By Science Productions

  • White Papers // Jan 2013

    A Secure Protocol Based on a Sedentary Agent for Mobile Agent Environments

    The main challenge when deploying mobile agent environments pertains to security issues concerning mobile agents and their executive platform. This paper proposes a secure protocol which protects mobile agents against attacks from malicious hosts in these environments. Protection is based on the perfect cooperation of a sedentary agent running inside...

    Provided By Science Productions

  • White Papers // Aug 2009

    Message Based Random Variable Length Key Encryption Algorithm

    A block ciphers provides confidentiality in cryptography but cryptanalysis of the classical block ciphers demonstrated some old weaknesses grabbing a partial key in any stage of encryption procedure leads to reconstructing the whole key. Exhaustive key search shows that key generation should be indeterminist and random for each round. Matching...

    Provided By Science Productions

  • White Papers // Dec 2012

    Secured Disclosure of Sensitive Data in Data Mining Techniques

    Recent advances in data collection, data dissemination and related technologies have inaugurated a new era of research where existing data mining algorithms should be reconsidered from the point of view of securing sensitive data. People have become increasingly unwilling to share their data. This frequently results in individuals either refusing...

    Provided By Science Productions

  • White Papers // Apr 2013

    A Framework for Simple Object Access Protocol Messages to Detect Expansion Attacks for Secure Webservice

    The world has shrunk in this internet era. the applications in the internet use xml and web services which are simple, but powerful standards that enable applications to more efficiently communicate with each other. Unfortunately this advantage is coupled with concerns of web services security. All the services provided by...

    Provided By Science Productions

  • White Papers // Jul 2009

    Priority and Random Selection for Dynamic Window Secured Implicit Geographic Routing in Wireless Sensor Network

    Sensor nodes are easily exposed to many attacks since it were deployed in unattended adversarial environment with no global addressing and used for critical applications such as battlefield surveillance and emergency response. While the sensor also needs to act as a router to relay a message to a required recipient,...

    Provided By Science Productions

  • White Papers // Oct 2013

    Design of a Dual Keyboard

    The design of a computer keyboard with dual function is proposed. This computer keyboard called Dual Keyboard can function both as a normal keyboard and as a pressure sensitive keyboard. The proposed device has a switch that decides the function. The keyboard makes use of sensors placed beneath the keys...

    Provided By Science Productions

  • White Papers // May 2011

    Applying Packet Generator for Secure Network Environment

    Viruses and hacker attacks typically generate a recognizable pattern or \"Signature\" of packets. Most of network traffic analyzer can identify these packets and alert the administrator to their presence on the network via email or page. Most traffics analyzers let them set alarms to be triggered when a particular pattern...

    Provided By Science Productions

  • White Papers // Jan 2013

    Secured Requirement Specification Framework (SRSF)

    Generally, software engineers are poorly trained to elicit, analyze and specify security requirements, often confusing them with the architectural security mechanisms that are traditionally used to fulfill them. One of the most ignored parts of a security-enhanced software development lifecycle is the security requirements engineering process. Security should begin at...

    Provided By Science Productions

  • White Papers // Oct 2012

    Evaluating the Strengths and Weaknesses of Mining Audit Data for Automated Models for Intrusion Detection in Tcpdump and Basic Security Module Data

    Intrusion Detection System (IDS) have become an important component of infrastructure protection mechanism to secure the current and emerging networks, its services and applications by detecting, alerting and taking necessary actions against the malicious activities. The network size, technology diversities and security policies make networks more challenging and hence there...

    Provided By Science Productions

  • White Papers // Aug 2012

    Routing Based Data Security in Mobile Ad Hoc Network Using Group Key Management

    A Mobile Ad-hoc NETwork (MANET) is a self-organizing system of mobile devices followed an infrastructure less framework associated by wireless links. In MANET, there is a possibility of packet data to get lost or hacked by an attacker. So, to improve a secure communication over MANET from attackers, several techniques...

    Provided By Science Productions

  • White Papers // Aug 2012

    Network Planning and Optimization for Multi-Hop Relay Placement in WiMAX Networks

    Wireless access networks can provide high level of quality of services at low network installation budget if the networks are planned by using proper methods. In this paper, the authors developed efficient network planning methods for Wireless Interoperability for Microwave Access (WiMAX) networks in which the multiple hops of relay...

    Provided By Science Productions

  • White Papers // Aug 2012

    A Generic Charging Policy Based Accounting for Web Services

    Metering and charging are basic accounting functions that are essential for commercial usage of web services. Current charging and accounting schemes primarily involve users being charged flat or based on the connection/session time. Accounting management of web services should provide for metering, charging, accounting, billing, payment and auditing. The authors...

    Provided By Science Productions

  • White Papers // Sep 2012

    Impact of Algorithms for the Extraction of Minutiae Points in Fingerprint Biometrics

    As the importance of automatic personal identification applications increases, biometrics particularly fingerprint identification is the most consistent and greatly acknowledged technique. A very important step in automatic fingerprint recognition system is to extract the minutiae points from the input fingerprint images automatically and quickly. Fingerprints from the database FVC2002 (DB1-a)...

    Provided By Science Productions

  • White Papers // Aug 2012

    Wireless Sensor Networks Fault Identification Using Data Association

    Wireless Sensor Networks (WSN) are formed by thousands of lightweight nodes equipped with transducers for capturing information. The captured data are transmitted using multi hop routes to a base station, also called a sink. They can be extensively deployed during emergency response, medical monitoring and mission critical applications requiring extensive...

    Provided By Science Productions

  • White Papers // Oct 2012

    End to End Delay Improvement in Heterogeneous Multicast Network Using Genetic Optimization

    Multicast is a concept of group communication which refers to transmitting the same data or messages from a source to multiple destinations in the network. This one-to-many group communication is a generalization of the concepts of one-to-one unicast and one-to-all broadcast. To deliver data from the sender to all receivers...

    Provided By Science Productions