University of Calcutta

Displaying 1-30 of 30 results

  • White Papers // Oct 2013

    Detection of Algebraic Manipulation in the Presence of Leakage

    The authors investigate the problem of Algebraic Manipulation Detection (AMD) over a communication channel that partially leaks information to an adversary. They assume the adversary is computationally unbounded and there is no shared key or correlated randomness between the sender and the receiver. They introduce Leakage-Resilient (LR)-AMD codes to detect...

    Provided By University of Calcutta

  • White Papers // Jan 2013

    Profit-Maximizing Virtual Machine Trading in a Federation of Selfish Clouds

    The emerging federated cloud paradigm advocates sharing of resources among cloud providers, to exploit temporal availability of resources and diversity of operational costs for job serving. While extensive studies exist on enabling interoperability across different cloud platforms, a fundamental question on cloud economics remains unanswered: When and how should a...

    Provided By University of Calcutta

  • White Papers // Nov 2012

    Analysis of Spectral Efficiency and Energy Efficiency Interrelationship in Cellular Networks With Outage Constraint

    This paper analyzes the interrelationship between the Spectral Efficiency (SE) and Energy Efficiency (EE) of cellular networks where the Base Stations (BSs) are arbitrarily distributed. The SE and EE performance metrics are assessed subject to a downlink transmission outage constraint when operating in interference limited operational environments. The network EE...

    Provided By University of Calcutta

  • White Papers // Nov 2012

    Emerging Issues & Challenges in Cloud Computing - A Hybrid Approach

    As cloud computing continues to gain more momentum in the IT industry, more issues and challenges are being re-ported by academics and practitioners. In this paper, the authors aim to attain an understanding of the types of issues and challenges that have been emerging over the past five years and...

    Provided By University of Calcutta

  • White Papers // Oct 2012

    Information Multicast in Planar Networks: Efficient Network Coding Over Small Finite Fields

    Network coding encourages in-network mixing of information flows for enhanced network capacity, particularly for multicast data dissemination. While existing theory on multicast network coding often treats the underlying network topology as a black box, the authors show that exploring network-specific properties in the topology can lead to much more efficient...

    Provided By University of Calcutta

  • White Papers // Jul 2012

    Efficient Wireless Security Through Jamming, Coding and Routing

    There is a rich recent literature on how to assist secure communication between a single transmitter and receiver at the physical layer of wireless networks through techniques such as cooperative jamming. In this paper, the authors consider how these single-hop physical layer security techniques can be extended to multi-hop wireless...

    Provided By University of Calcutta

  • White Papers // Jul 2012

    Adaptive Trapdoor Functions and Chosen-Ciphertext Security

    The authors introduce the notion of Adaptive TrapDoor Functions (ATDFs); roughly, ATDFs remain one-way even when the adversary is given access to an inversion oracle. Their main application is the black-box construction of Chosen-Ciphertext Attack secure Public-Key Encryption (CCA-secure PKE). Namely, they give a black-box construction of CCA-Secure PKE from...

    Provided By University of Calcutta

  • White Papers // Jul 2012

    Exploring the Sustainability of Credit-Incentivized Peer-to-Peer Content Distribution

    Credit-based incentives were proposed to incite peer contributions in P2P content distribution systems. Their effectiveness was extensively analyzed from a game theory perspective. Little attention however has been paid to a potential threat to such systems - the possible condensation of credits in a small number of peers over time....

    Provided By University of Calcutta

  • White Papers // May 2012

    Improving Aerially Deployed Sensor Networks Using Cooperative Communications

    Deploying Wireless Sensor Networks (WSNs) from Unmanned Aerial Vehicles (UAVs) can reduce the cost of large rollouts and make it safer to deploy sensors in disaster areas. However, aerial deployment can lead to nodes with arbitrary orientations and, thus, to misaligned antennas. While this problem was observed during experiments, it...

    Provided By University of Calcutta

  • White Papers // Apr 2012

    Private Fingerprint Matching

    The authors propose a fully private fingerprint matching protocol that compares two fingerprints based on the most widely-used minutia-based fingerprint matching algorithm. The protocol enables two parties, each holding a private fingerprint, to find out if their fingerprints belong to the same individual. Unlike previous works, they do not make...

    Provided By University of Calcutta

  • White Papers // Mar 2012

    A Battery Aware Distributed Clustering and Routing Protocol for Wireless Sensor Networks

    The objective of improving energy efficiency in Wireless Sensor Networks (WSNs) is a primary design requirement given the limited energy available in the battery powered sensor nodes. In this paper, a battery aware distributed clustering and routing protocol is proposed for the maximization of the network lifetime. The proposed protocol...

    Provided By University of Calcutta

  • White Papers // Jan 2012

    Evaluating the Performance of Modified DSR in Presence of Noisy Links Using QUALNET Network Simulator in MANET

    For routing in MANET, finding the shortest path between nodes based on the classical hop-count metric may not always be the best routing criteria to be considered because the shortest path might be congested or error prone due to noisy interference leading to poor network throughput and packet delivery ratio....

    Provided By University of Calcutta

  • White Papers // Jan 2012

    Intrusion Detection for Resource-Constrained Embedded Control Systems in the Power Grid

    The power grid depends on embedded control systems or SCADA systems to function properly. Securing these systems presents unique challenges - in addition to the resource restrictions inherent to embedded devices, SCADA systems must accommodate strict timing requirements that are non-negotiable, and their massive scale greatly amplifies costs such as...

    Provided By University of Calcutta

  • White Papers // Nov 2011

    The Evolution of IDs Solutions in Wireless Ad-Hoc Networks to Wireless Mesh Networks

    The domain of wireless networks is inherently vulnerable to attacks due to the unreliable wireless medium. Such networks can be secured from intrusions using either prevention or detection schemes. This paper focuses its study on intrusion detection rather than prevention of attacks. As attackers keep on improvising too, an active...

    Provided By University of Calcutta

  • White Papers // Aug 2011

    Modeling Smart Grid Using Generalized Stochastic Petri Net

    Building smart grid for power system is a major challenge for safe, automated and energy efficient usage of electricity. The full implementation of the smart grid will evolve over time. However, before a new set of infrastructures are invested to build the smart grid, proper modeling and analysis is needed...

    Provided By University of Calcutta

  • White Papers // Aug 2011

    A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security

    In order to determine the user's trust is a growing concern for ensuring privacy and security in a cloud computing environment. In cloud, user's data is stored in one or more remote server(s) which poses more security challenges for the system. One of the most important concerns is to protect...

    Provided By University of Calcutta

  • White Papers // Jul 2011

    On the Performance of Successive Interference Cancellation in Random Access Networks

    Successive Interference Cancellation (SIC) is a physical-layer technique that enables reception of multiple overlapping transmissions. While SIC has the potential to boost the network throughput, if the MAC protocol employed in the network is agnostic to such a capability at the physical-layer, the full potential of SIC cannot be utilized...

    Provided By University of Calcutta

  • White Papers // Jul 2011

    A State-of-the-art Survey on IDS for Mobile Ad-Hoc Networks and Wireless Mesh Networks

    An Intrusion Detection System (IDS) detects malicious and selfish nodes in a network. Ad hoc networks are often secured by using either intrusion detection or by secure routing. Designing efficient IDS for wireless ad-hoc networks that would not affect the performance of the network significantly is indeed a challenging task....

    Provided By University of Calcutta

  • White Papers // Mar 2011

    Indoor Wireless Planning using Smart Antennas

    This paper considers the problem of indoor wireless planning using smart antennas. Smart antennas have gained much attention in wireless networking because of their capability in providing more spatial reuse and increased network capacity. Recent research has demonstrated their effectiveness in indoor environments where omni-directional antennas have been traditionally the...

    Provided By University of Calcutta

  • White Papers // Sep 2010

    A Closer Look at Anonymity and Robustness in Encryption Schemes

    In this paper, the authors take a closer look at anonymity and robustness in encryption schemes. Roughly speaking, an anonymous encryption scheme hides the identity of the secret-key holder, while a robust encryption scheme guarantees that every ciphertext can only be decrypted to a valid plaintext under the intended recipient's...

    Provided By University of Calcutta

  • White Papers // Apr 2010

    Security Estimates for Quadratic Field Based Cryptosystems

    The authors describe implementations for solving the discrete logarithm problem in the class group of an imaginary quadratic field and in the infrastructure of a real quadratic field. The algorithms used incorporate improvements over previously-used algorithms, and extensive numerical results are presented demonstrating their efficiency. This data is used as...

    Provided By University of Calcutta

  • White Papers // Mar 2010

    Computer Network Topology Design in Limelight of Pascal Graph Theory

    Constantly growing demands of high productivity and security of computer systems and computer networks call the interest of specialists in the environment of construction of optimum topologies of computer mediums. In earliest phases of design, the study of the topological influence of the processes that happen in computer systems and...

    Provided By University of Calcutta

  • White Papers // Jan 2010

    Energy-Efficient Clustering in Wireless Sensor Networks With Spatially Correlated Data

    In this paper, the authors show how spatial correlation in data can be exploited to reduce energy consumption in a wireless sensor network. They analytically characterize the optimal cluster size, and then use a greedy clustering algorithm to study approximate solutions to the optimal data gathering problem. A Wireless Sensor...

    Provided By University of Calcutta

  • White Papers // Oct 2009

    A Graph-Based Resource Allocation Algorithm for Downlink MIMO-OFDMA Networks

    In this paper, the authors develop an efficient resource allocation algorithm for Multiple-Input Multiple-Output Orthogonal Frequency Division Multiple Access (MIMO-OFDMA) networks that considers all OFDM symbols in the current frame. By recognizing the special structure of the optimization problem, they develop an efficient algorithm based on graph theory that has...

    Provided By University of Calcutta

  • White Papers // Sep 2009

    An Attack on the Privacy of Sanitized Data That Fuses the Outputs of Multiple Data Miners

    Data sanitization has been used to restrict re-identification of individuals and disclosure of sensitive information from published data. The authors propose an attack on the privacy of the published sanitized data that simply fuses outputs of multiple data miners that are applied to the sanitized data. That attack is practical...

    Provided By University of Calcutta

  • White Papers // Sep 2009

    Conceptual Level Design of Object Oriented Data Warehouse: Graph Semantic Based Model

    This paper proposes a Graph semantic based Object Oriented Multidimensional Data Model (GOOMD). The model defines a set of graph based formal constructs that are used to specify the conceptual level design of Data Warehouses (DW). Besides offering a novel graph based semantic for multidimensional data representation, the proposed GOOMD...

    Provided By University of Calcutta

  • White Papers // Aug 2009

    Lacber: A New Location Aided Routing Protocol for GPS Scarce Manet

    Completely GPS-free positioning systems for wireless, mobile, ad-hoc networks typically stress on building a network-wide coordinate system. Such systems suffer from lack of mobility and high computational overhead. On the other hand, specialized hardware in GPS-enabled nodes tends to increase the solution cost. A number of GPS free position based...

    Provided By University of Calcutta

  • White Papers // Jun 2009

    Mobile Queries in GIS

    In this paper, the authors propose an algorithm for exhaustive search of GIS Mobile query (point-in-area function). This algorithm search the status of a given co-ordinate point with respect to an area (described as a set of co-ordinates without any geometric relationship). In the exhaustive search algorithm proposed previously, there...

    Provided By University of Calcutta

  • White Papers // Sep 2006

    Challenges in Enterprise Adoption of Agile Methods - A Survey

    Agile methods are a departure from plan-driven traditional approaches, where the focus is on generating early releases of working software using collaborative techniques, code refactoring, and on-site customer involvement. Research and surveys have shown that agile methodologies are an efficient way of producing software with significant advantages in production costs,...

    Provided By University of Calcutta

  • White Papers // May 2006

    Executable Acceptance Tests for Communicating Business Requirements: Customer Perspective

    Testing has a prominent role in most agile projects regardless of which agile method is adopted. Testing is no longer just a phase at the end of the development lifecycle done when the coding is completed. Using an experimental method, the authors found that customers, partnered with an IT professional,...

    Provided By University of Calcutta

  • White Papers // Jul 2012

    Exploring the Sustainability of Credit-Incentivized Peer-to-Peer Content Distribution

    Credit-based incentives were proposed to incite peer contributions in P2P content distribution systems. Their effectiveness was extensively analyzed from a game theory perspective. Little attention however has been paid to a potential threat to such systems - the possible condensation of credits in a small number of peers over time....

    Provided By University of Calcutta

  • White Papers // Apr 2012

    Private Fingerprint Matching

    The authors propose a fully private fingerprint matching protocol that compares two fingerprints based on the most widely-used minutia-based fingerprint matching algorithm. The protocol enables two parties, each holding a private fingerprint, to find out if their fingerprints belong to the same individual. Unlike previous works, they do not make...

    Provided By University of Calcutta

  • White Papers // Jul 2011

    On the Performance of Successive Interference Cancellation in Random Access Networks

    Successive Interference Cancellation (SIC) is a physical-layer technique that enables reception of multiple overlapping transmissions. While SIC has the potential to boost the network throughput, if the MAC protocol employed in the network is agnostic to such a capability at the physical-layer, the full potential of SIC cannot be utilized...

    Provided By University of Calcutta

  • White Papers // Jan 2013

    Profit-Maximizing Virtual Machine Trading in a Federation of Selfish Clouds

    The emerging federated cloud paradigm advocates sharing of resources among cloud providers, to exploit temporal availability of resources and diversity of operational costs for job serving. While extensive studies exist on enabling interoperability across different cloud platforms, a fundamental question on cloud economics remains unanswered: When and how should a...

    Provided By University of Calcutta

  • White Papers // Mar 2011

    Indoor Wireless Planning using Smart Antennas

    This paper considers the problem of indoor wireless planning using smart antennas. Smart antennas have gained much attention in wireless networking because of their capability in providing more spatial reuse and increased network capacity. Recent research has demonstrated their effectiveness in indoor environments where omni-directional antennas have been traditionally the...

    Provided By University of Calcutta

  • White Papers // Jul 2012

    Efficient Wireless Security Through Jamming, Coding and Routing

    There is a rich recent literature on how to assist secure communication between a single transmitter and receiver at the physical layer of wireless networks through techniques such as cooperative jamming. In this paper, the authors consider how these single-hop physical layer security techniques can be extended to multi-hop wireless...

    Provided By University of Calcutta

  • White Papers // Nov 2012

    Analysis of Spectral Efficiency and Energy Efficiency Interrelationship in Cellular Networks With Outage Constraint

    This paper analyzes the interrelationship between the Spectral Efficiency (SE) and Energy Efficiency (EE) of cellular networks where the Base Stations (BSs) are arbitrarily distributed. The SE and EE performance metrics are assessed subject to a downlink transmission outage constraint when operating in interference limited operational environments. The network EE...

    Provided By University of Calcutta

  • White Papers // Oct 2009

    A Graph-Based Resource Allocation Algorithm for Downlink MIMO-OFDMA Networks

    In this paper, the authors develop an efficient resource allocation algorithm for Multiple-Input Multiple-Output Orthogonal Frequency Division Multiple Access (MIMO-OFDMA) networks that considers all OFDM symbols in the current frame. By recognizing the special structure of the optimization problem, they develop an efficient algorithm based on graph theory that has...

    Provided By University of Calcutta

  • White Papers // Mar 2012

    A Battery Aware Distributed Clustering and Routing Protocol for Wireless Sensor Networks

    The objective of improving energy efficiency in Wireless Sensor Networks (WSNs) is a primary design requirement given the limited energy available in the battery powered sensor nodes. In this paper, a battery aware distributed clustering and routing protocol is proposed for the maximization of the network lifetime. The proposed protocol...

    Provided By University of Calcutta

  • White Papers // Apr 2010

    Security Estimates for Quadratic Field Based Cryptosystems

    The authors describe implementations for solving the discrete logarithm problem in the class group of an imaginary quadratic field and in the infrastructure of a real quadratic field. The algorithms used incorporate improvements over previously-used algorithms, and extensive numerical results are presented demonstrating their efficiency. This data is used as...

    Provided By University of Calcutta

  • White Papers // Oct 2012

    Information Multicast in Planar Networks: Efficient Network Coding Over Small Finite Fields

    Network coding encourages in-network mixing of information flows for enhanced network capacity, particularly for multicast data dissemination. While existing theory on multicast network coding often treats the underlying network topology as a black box, the authors show that exploring network-specific properties in the topology can lead to much more efficient...

    Provided By University of Calcutta

  • White Papers // Nov 2012

    Emerging Issues & Challenges in Cloud Computing - A Hybrid Approach

    As cloud computing continues to gain more momentum in the IT industry, more issues and challenges are being re-ported by academics and practitioners. In this paper, the authors aim to attain an understanding of the types of issues and challenges that have been emerging over the past five years and...

    Provided By University of Calcutta

  • White Papers // May 2006

    Executable Acceptance Tests for Communicating Business Requirements: Customer Perspective

    Testing has a prominent role in most agile projects regardless of which agile method is adopted. Testing is no longer just a phase at the end of the development lifecycle done when the coding is completed. Using an experimental method, the authors found that customers, partnered with an IT professional,...

    Provided By University of Calcutta

  • White Papers // Sep 2006

    Challenges in Enterprise Adoption of Agile Methods - A Survey

    Agile methods are a departure from plan-driven traditional approaches, where the focus is on generating early releases of working software using collaborative techniques, code refactoring, and on-site customer involvement. Research and surveys have shown that agile methodologies are an efficient way of producing software with significant advantages in production costs,...

    Provided By University of Calcutta

  • White Papers // Jan 2012

    Intrusion Detection for Resource-Constrained Embedded Control Systems in the Power Grid

    The power grid depends on embedded control systems or SCADA systems to function properly. Securing these systems presents unique challenges - in addition to the resource restrictions inherent to embedded devices, SCADA systems must accommodate strict timing requirements that are non-negotiable, and their massive scale greatly amplifies costs such as...

    Provided By University of Calcutta

  • White Papers // Oct 2013

    Detection of Algebraic Manipulation in the Presence of Leakage

    The authors investigate the problem of Algebraic Manipulation Detection (AMD) over a communication channel that partially leaks information to an adversary. They assume the adversary is computationally unbounded and there is no shared key or correlated randomness between the sender and the receiver. They introduce Leakage-Resilient (LR)-AMD codes to detect...

    Provided By University of Calcutta

  • White Papers // Sep 2009

    An Attack on the Privacy of Sanitized Data That Fuses the Outputs of Multiple Data Miners

    Data sanitization has been used to restrict re-identification of individuals and disclosure of sensitive information from published data. The authors propose an attack on the privacy of the published sanitized data that simply fuses outputs of multiple data miners that are applied to the sanitized data. That attack is practical...

    Provided By University of Calcutta

  • White Papers // Sep 2010

    A Closer Look at Anonymity and Robustness in Encryption Schemes

    In this paper, the authors take a closer look at anonymity and robustness in encryption schemes. Roughly speaking, an anonymous encryption scheme hides the identity of the secret-key holder, while a robust encryption scheme guarantees that every ciphertext can only be decrypted to a valid plaintext under the intended recipient's...

    Provided By University of Calcutta

  • White Papers // Jul 2012

    Adaptive Trapdoor Functions and Chosen-Ciphertext Security

    The authors introduce the notion of Adaptive TrapDoor Functions (ATDFs); roughly, ATDFs remain one-way even when the adversary is given access to an inversion oracle. Their main application is the black-box construction of Chosen-Ciphertext Attack secure Public-Key Encryption (CCA-secure PKE). Namely, they give a black-box construction of CCA-Secure PKE from...

    Provided By University of Calcutta

  • White Papers // Mar 2010

    Computer Network Topology Design in Limelight of Pascal Graph Theory

    Constantly growing demands of high productivity and security of computer systems and computer networks call the interest of specialists in the environment of construction of optimum topologies of computer mediums. In earliest phases of design, the study of the topological influence of the processes that happen in computer systems and...

    Provided By University of Calcutta

  • White Papers // Aug 2009

    Lacber: A New Location Aided Routing Protocol for GPS Scarce Manet

    Completely GPS-free positioning systems for wireless, mobile, ad-hoc networks typically stress on building a network-wide coordinate system. Such systems suffer from lack of mobility and high computational overhead. On the other hand, specialized hardware in GPS-enabled nodes tends to increase the solution cost. A number of GPS free position based...

    Provided By University of Calcutta

  • White Papers // Aug 2011

    A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security

    In order to determine the user's trust is a growing concern for ensuring privacy and security in a cloud computing environment. In cloud, user's data is stored in one or more remote server(s) which poses more security challenges for the system. One of the most important concerns is to protect...

    Provided By University of Calcutta

  • White Papers // Jun 2009

    Mobile Queries in GIS

    In this paper, the authors propose an algorithm for exhaustive search of GIS Mobile query (point-in-area function). This algorithm search the status of a given co-ordinate point with respect to an area (described as a set of co-ordinates without any geometric relationship). In the exhaustive search algorithm proposed previously, there...

    Provided By University of Calcutta

  • White Papers // Jul 2011

    A State-of-the-art Survey on IDS for Mobile Ad-Hoc Networks and Wireless Mesh Networks

    An Intrusion Detection System (IDS) detects malicious and selfish nodes in a network. Ad hoc networks are often secured by using either intrusion detection or by secure routing. Designing efficient IDS for wireless ad-hoc networks that would not affect the performance of the network significantly is indeed a challenging task....

    Provided By University of Calcutta

  • White Papers // Nov 2011

    The Evolution of IDs Solutions in Wireless Ad-Hoc Networks to Wireless Mesh Networks

    The domain of wireless networks is inherently vulnerable to attacks due to the unreliable wireless medium. Such networks can be secured from intrusions using either prevention or detection schemes. This paper focuses its study on intrusion detection rather than prevention of attacks. As attackers keep on improvising too, an active...

    Provided By University of Calcutta

  • White Papers // Aug 2011

    Modeling Smart Grid Using Generalized Stochastic Petri Net

    Building smart grid for power system is a major challenge for safe, automated and energy efficient usage of electricity. The full implementation of the smart grid will evolve over time. However, before a new set of infrastructures are invested to build the smart grid, proper modeling and analysis is needed...

    Provided By University of Calcutta

  • White Papers // Jan 2012

    Evaluating the Performance of Modified DSR in Presence of Noisy Links Using QUALNET Network Simulator in MANET

    For routing in MANET, finding the shortest path between nodes based on the classical hop-count metric may not always be the best routing criteria to be considered because the shortest path might be congested or error prone due to noisy interference leading to poor network throughput and packet delivery ratio....

    Provided By University of Calcutta

  • White Papers // Sep 2009

    Conceptual Level Design of Object Oriented Data Warehouse: Graph Semantic Based Model

    This paper proposes a Graph semantic based Object Oriented Multidimensional Data Model (GOOMD). The model defines a set of graph based formal constructs that are used to specify the conceptual level design of Data Warehouses (DW). Besides offering a novel graph based semantic for multidimensional data representation, the proposed GOOMD...

    Provided By University of Calcutta

  • White Papers // Jan 2010

    Energy-Efficient Clustering in Wireless Sensor Networks With Spatially Correlated Data

    In this paper, the authors show how spatial correlation in data can be exploited to reduce energy consumption in a wireless sensor network. They analytically characterize the optimal cluster size, and then use a greedy clustering algorithm to study approximate solutions to the optimal data gathering problem. A Wireless Sensor...

    Provided By University of Calcutta

  • White Papers // May 2012

    Improving Aerially Deployed Sensor Networks Using Cooperative Communications

    Deploying Wireless Sensor Networks (WSNs) from Unmanned Aerial Vehicles (UAVs) can reduce the cost of large rollouts and make it safer to deploy sensors in disaster areas. However, aerial deployment can lead to nodes with arbitrary orientations and, thus, to misaligned antennas. While this problem was observed during experiments, it...

    Provided By University of Calcutta