Sri V

Displaying 1-4 of 4 results

  • White Papers // Jun 2013

    Secure Intrusion Detection and Attack Measure Selection in Virtual Network Systems

    Cloud security is one of most important issues that have attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denial-of-Service (DDoS). DDoS attacks usually involve early stage actions such...

    Provided By Sri V

  • White Papers // Jun 2013

    Two Aspect Authentication System Using Secure Mobile Devices

    Mobile devices are becoming more pervasive and more advanced with respect to their processing power and memory size. Relying on the personalized and trusted nature of such devices, security features can be deployed on them in order to uniquely identify a user to a service provider. In this paper, the...

    Provided By Sri V

  • White Papers // Jan 2013

    Secure Routing Protocol Based on Unobservable Identity in Mobile Ad-Hoc Networks

    Mobile Ad-hoc NETworks (MANETS) are particularly useful and well-suited for critical scenarios, including military, law enforcement as well as emergency rescue and disaster recovery. An Unobservable Secure On-demand Routing protocol (USOR) scheme achieves content unobservability by employing anonymous key establishment based on group signature for improving the performance of a...

    Provided By Sri V

  • White Papers // Nov 2011

    Application of Biometrics to Prevent Credit Card Fraud

    In this paper, the authors propose an idea that involves iris, retina signature analysis for identity recognition for prevention of credit card fraud. They employ Canny Edge Detector algorithm for detection of vessel pattern in the retina. This process is performed at the Automatic Teller Machine (ATM) and Self Service...

    Provided By Sri V

  • White Papers // Jun 2013

    Secure Intrusion Detection and Attack Measure Selection in Virtual Network Systems

    Cloud security is one of most important issues that have attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denial-of-Service (DDoS). DDoS attacks usually involve early stage actions such...

    Provided By Sri V

  • White Papers // Nov 2011

    Application of Biometrics to Prevent Credit Card Fraud

    In this paper, the authors propose an idea that involves iris, retina signature analysis for identity recognition for prevention of credit card fraud. They employ Canny Edge Detector algorithm for detection of vessel pattern in the retina. This process is performed at the Automatic Teller Machine (ATM) and Self Service...

    Provided By Sri V

  • White Papers // Jan 2013

    Secure Routing Protocol Based on Unobservable Identity in Mobile Ad-Hoc Networks

    Mobile Ad-hoc NETworks (MANETS) are particularly useful and well-suited for critical scenarios, including military, law enforcement as well as emergency rescue and disaster recovery. An Unobservable Secure On-demand Routing protocol (USOR) scheme achieves content unobservability by employing anonymous key establishment based on group signature for improving the performance of a...

    Provided By Sri V

  • White Papers // Jun 2013

    Two Aspect Authentication System Using Secure Mobile Devices

    Mobile devices are becoming more pervasive and more advanced with respect to their processing power and memory size. Relying on the personalized and trusted nature of such devices, security features can be deployed on them in order to uniquely identify a user to a service provider. In this paper, the...

    Provided By Sri V