Security
What's worse than getting hit with a security breach? Getting hit with an easily preventable one.
-
Managing threats in the digital age
The topic of security is now unquestionably a C-suite priority. An enterprise that delegates security matters solely to the CIO is compounding its risk factors. Organizations need to move toward a mor...
Provided By IBM
-
Centralized and Cooperative Transmission of Secure Multiple Unicasts Using Network Coding
The authors introduce a method for securely delivering a set of messages to a group of clients over a broadcast erasure channel where each client is interested in a distinct message. Each client is ab...
Provided By Australian National University
-
Limiting the Neighborhood: De-Small-World Network for Outbreak Prevention
In this paper, the authors study a basic and practically important strategy to help prevent and/or delay an outbreak in the context of network: limiting the contact between individuals. In this paper,...
Provided By Kent State University
-
Mission-Critical Matters
Jonathan Patrizio, HP High Availability and Disaster Recovery Expert, shares how you can utilize Linux ServiceGuard running on Intel® Itanium® processor-powered HP-UX to deliver uncompromising availab...
Provided By HP and Intel® Itanium® Processors
-
Enhancement of Biometric Template Security in Multibiometric Systems
Security is a very important aspect in the biometric systems. Biometric characteristics are unique to an individual hence the compromise of the biometric template is permanent. Attackers mostly attack...
Provided By Lovely Professional University
-
Detection of Anomalies From Dataset Using Distributed Methods
Detection of anomalies has been an ergonomic way to attention in many application and research area. This paper includes with the detection of network intrusion, malware detection, biological data, im...
Provided By International Journal of Advances in Engineering & Technology (IJAET)
-
Intrusion Detection in Computer Network Using Genetic Algorithm Approach: A Survey
The intrusion detection problem is becoming a challenging task due to the proliferation of heterogeneous computer networks since the increased connectivity of computer systems gives greater access to ...
Provided By International Journal of Advances in Engineering & Technology (IJAET)
-
Analysis and Implementation of Different Digital Image Watermarking Techniques for Secure Data Transmission
The rapid advancement of internet has made it easier to send the data/image accurate and faster to the destination. The ease by which digital information can be duplicated and distributed has led to t...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Secure Web Mining Framework for e-Commerce Websites
In this paper, the authors deal with e-commerce website and shows the usage of web mining technology to provide security for e-commerce websites. User behavior on the web is based on web mining, secur...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Wireless LAN Security: Addressing Challenges, Attacks and Solutions
With tremendous growth and advancement in wireless technology and excessive use of internet in all the applications, security has become one of the most crucial and most demanding factors in wireless ...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Reviewing Effectiveness of CAPTCHA
The massive use of the Internet and WWW by the government and commercial organizations for automation of work has resulted in extensive proliferation of online computing. To avoid online forms being f...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Implementation Opass Authentication Protocol System for Net Security
Safety may be a major focus of awareness for operators and users of the web site and its several applications, among the tough issues still inefficiently self-addressed is identity authentication for ...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Review of Transactions on Illuminated Facial Image Preprocessing for User Authentication
In this paper, the authors mainly deal with improving the performance of face detection security system by removing the two most important factors that is illumination and reflectance which hamper det...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Hybridization of Symmetric Key Encryption and Visual Cryptography
Visual cryptography technique encipher the visual information in such a way, that decipher can be performed by human visual system without any complex decoding process. As visual cryptography, is a se...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Slicing Technique For Privacy Preserving Data Publishing
Privacy-preserving data mining is the area of data mining that used to safeguard sensitive information from unsanctioned disclosure .The problem of privacy-preserving data mining has become more impor...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Entrenched Visual Cryptography Using Secret Sharing Scheme with Public Key
Visual Cryptography Scheme (VCS) is a cryptography technique which allow visual data i.e.: printed text, handwritten notes, and picture is encrypted in such a way that the decryption can be done by th...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Improving System Protection and Performance in The Tor System End-To-End Tunable Path Selection
Tor, a circuit-based low-latency anonymous communication service, is a protocol that is both ore secure and performs better, both in terms of observed performance and in terms of achievable anonymity ...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Neural Cryptography for Secret Key Exchange and Encryption with AES
Cryptography is the art of mangling information into apparent unintelligibility in a manner allowing a secret method of unmangling. The basic service provided by cryptography is the ability to send in...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Wireless Networking Security ("Secured-Nim": Blocking Misbehaving Users In Anonymizing Networks)
Through this paper, the authors are trying to reflect the weaknesses and counter measures that are put forward until recently of the wireless security. They present a structure to help managers apprec...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Intrusion Detection System (A Layered Based Approach for Finding Attacks)
Now-a-days the number of computer networks keeps growing in parallel with transactions, especially on the Internet while streaming, video conferencing, chatting, searching, etc. This paper titled "Int...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Securing Data by Using Cryptography with Steganography
Securing data is a challenging issue in today's era. Most of the data travel over the internet and it becomes difficult to make data secure. So Cryptography was introduced for making data secure. But ...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
A Novel Approach for Securing Biometric Template
Template and database are critical parts of biometric systems. Attacker usually afflict biometric template. There can be various attacks on different modules of biometrics system and communication lin...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
A Review Paper on Pooled Black Hole Attack in MANET
Ad-hoc networks are emerging technology, due to their spontaneous nature, are frequently established insecure environments, which makes them vulnerable to attacks. These attacks are launched by partic...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
A Security Protocols Against Cyber Attacks Using SMS Alert
Cybercrime refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime. Cybercrime refers, more precise...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Detection of Various Attacks in Wireless Sensor Networks Using Zero Knowledge Protocol
Wireless Sensor Networks (WSNs) offer an excellent opportunity to monitor environments, and have a lot of interesting applications, some of which are quite sensitive in nature and require full proof s...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Study of MANET: Characteristics, Challenges, Application and Security Attacks
Mobile Ad-hoc NETworks (MANETs) is an infrastructure-less, dynamic network consisting of a collection of wireless mobile nodes that communicate with each other without the use of any centralized autho...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Porting the Linux Kernel to Arm System-On-Chip And Implementation of RFID Based Security System Using ARM
In this paper, the authors emphasize on porting the Linux kernel to an ARM board and thus implementing the RFID (Radio Frequency IDentification) based security system using the ARM board. ARM System-O...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Malware Classification based on Clustering and classification
Malware, short for malicious software, means a variety of forms of hostile, intrusive, or annoying software or program code. Malware is a pervasive problem in distributed computer and network systems....
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
FPGA Implementation of Cryptographic Algorithms using Multi-Encryption Technique
As internet is in enormous demand and it acts as a repository for the data and knowledge, there is unremitting demand for real time implementation of cryptographic algorithms so that one can secure it...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Enhanced Amalgam Encryption Approach for Grid Security
Grid computing is about several processors distributed globally and sharing the computational resources to solve various problems. Grid computing has become an increasingly important research topic wi...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Anomaly detection in RDBMS
Intrusion and malicious modification are more prevalent in database so organizations show considerable effort in maintaining the secrecy and security of the Database Management System. It shows intere...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Phishing & Anti-Phishing Techniques: Case Study
Phishing is a con game that scammers use to collect personal information from unsuspecting users. The false e-mails often look surprisingly legitimate and even the Web pages where users are asked to e...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Biometrics and Face Recognition Techniques
Biometrics is a growing technology, which has been widely used in forensics, secured access and prison security. A biometric system is fundamentally a pattern recognition system that recognizes a pers...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Breaking Cryptosystem's through Cache Based Timing Side Channel Attack
A new class of physical attacks against cryptographic modules, called as Side-Channel Attacks (SCA) is a powerful technique to reveal secret keys of cryptographic devices. SCA tries to exploit specifi...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
An Efficient Approach to Improve Response Time in Multibiometric Patterns Retrieval From Large Database
Biometric technologies are automated methods of verifying or recognizing the identity of a living person based on a physiological or behavioural characteristics. In a biometric identification system, ...
Provided By Creative Commons
-
Detection of Malicious Url Redirection and Distribution
Web-based malicious software (malware) has been increasing over the Internet. It poses threats to computer users through web sites. Computers are infected with Web-based malware by drive-by-download a...
Provided By Creative Commons
-
Safekeeping of Network Executive for a Domestic Internet Service Provider
A net is one of the most important basic resources a large institution needs to have. Today, a network plays a very important role in every group. With extensive dispersed positioning, supervision the...
Provided By Creative Commons
-
Hierarchical EAP Back-End Authenticator State Machine
Authentication is a basic requirement for telecommunication network market for allowing resources to the legitimate users. Extended Authentication Protocol (EAP) is a widely used protocol for authenti...
Provided By Creative Commons
-
Computer Virus: Their Problems & Major Attacks in Real Life
Today's enterprise networks are distributed to different geographical locations and applications are more centrally located, information represents the most important asset. With the growing number of...
Provided By Creative Commons
-
Review of First Hop Redundancy Protocol and Their Functionalities
In this paper, the authors are focusing on data link layer protocols. First, when designing a network, one of the most important things to focus on when is designing a network on how to deal with fail...
Provided By Creative Commons
-
Live and Trustworthy Forensic Analysis of Commodity Production Systems
The authors present HyperSleuth, a framework that leverages the virtualization extensions provided by commodity hardware to securely perform live forensic analysis of potentially compromised productio...
Provided By Vrije Universiteit Amsterdam
-
Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype
Skype is one of the most used P2P applications on the Internet: VoIP calls, instant messaging, SMS and other features are provided at a low cost to millions of users. Although Skype is a closed source...
Provided By Vrije Universiteit Amsterdam
-
Algorithm for Linear Number Partitioning into Maximum Number of Subsets
The number partitioning problem is to decide whether a given multi-set of integers can be partitioned into two "Halves" of given cardinalities such that the discrepancy, the absolute value of the diff...
Provided By Chittagong University of Engineering & Technology
-
Telematics Based Security System
This paper describes a new way of providing security for objects; the object can either be a file or an automotive like car, etc. The method used for providing security to objects is by creating a vir...
Provided By Gandhi Institute of Engineering & Technology
-
Security Analyses of One-Time System
Shannon put forward the concept of perfect secrecy and proved that some kinds of cryptosystems are perfectly secure. The paper analyzes Shannon's proof that some kinds of cryptosystems were of perfect...
Provided By Guilin University Of Electronic Technology
-
Security Enhancement to a Group Key Transfer Protocol Against Insider Attack
Group key transfer protocol distributes a session key to authorized members with a trusted key generation center. Nam et al. claim that they achieve security, efficiency and correctness based on Shami...
Provided By Guilin University Of Electronic Technology
-
An Improved Approach of Cryptography Using Triangulation and MSB Iteration Technique
In the people ever-increasingly connected world, the need for communicating data over the internet has grown considerably. This data can be intercepted and hence needs to be guarded against fraudulent...
Provided By JIS College of Engineering
-
Virtualization and Infrastructure Optimization
A reference guide to help you maximize your enterprise network infrastructure. Covers server, client and storage virtualization, as well as data center and network optimization.
Provided By CDW & VMware
-
A Novel Generic Session Based Bit Level Encryption Technique to Enhance Information Security
In this paper a session based symmetric key encryption system has been proposed and is termed as Permutated Cipher Technique (PCT). This technique is more fast, suitable and secure for larger files. I...
Provided By JIS College of Engineering
-
Theoretical Statistical Correlation for Biometric Identification Performance
Measurement and evaluation of biometric device performance is critical to end users and consumers of these devices. In this paper the authors present explicit theoretical correlation models when the b...
Provided By St. Lawrence University
-
A Parametric Correlation Framework for the Statistical Evaluation and Estimation of Biometric-Based Classification Performance in a Single Environment
In this paper, the authors propose a parametric correlation models for assessment of biometric classification error rates. Correctly specified correlations are integral to variance estimation and the ...
Provided By St. Lawrence University
-
An Intrusion Detection Model Based on Mining Data Streams
High speed, continuousness and infinity are the features in processing network data. With these characteristics, mining the data streams of network accesses is important and useful for discovering int...
Provided By Beijing University Of Technology
-
Fast Password Recovery Attack: Application to APOP
In this paper, the authors propose a fast password recovery attack to APOP application in local which can recover a password with 11 characters in less than one minute, recover a password with 31 char...
Provided By Beijing University Of Technology
-
Research on the Relationship Between Trust and Privacy in Network Environments
In network environments, the entities that connect to or interact with each other may know very little about each other or without prior knowledge at the beginning of an interaction. Therefore, in man...
Provided By Beijing University Of Technology
-
The REESSE1+ Public Key Cryptosystem
The trapdoor functions for RSA and ElGamal public key cryptosystems are computationally one-way, which indicates that there always exists one sufficiently large setting of the security dominant parame...
Provided By Beijing University Of Technology
-
Access Control Model Based on Trust
With the development of networking technology, traditional access control methods can no longer effectively deal with the security issues in open networking environments. As an important factor in net...
Provided By Beijing University Of Technology
-
Base Selection and Transmission Synchronization Algorithm in Quantum Cryptography
One Achilles heal of classical cryptographic communication systems is that secret communication can only take place after a key is communicated in secret over a totally secure communication channel. H...
Provided By University Dunarea de Jos - Galati
-
New Palm Print Authentication System by Using Wavelet Based Method
Palm print based personal verification has quickly entered the biometric family due to its ease of acquisition, high user acceptance and reliability. This paper proposes a palm print based identificat...
Provided By QIS College of Engineering and Technology
-
Certificate-Based Single Sign-On Mechanism for Multi-Platform Distributed Systems
In this paper the authors propose a single sign-on mechanism based on certificates generated on request for client applications. Single sign-on mechanisms ensure the use of user credentials for access...
Provided By University of Medicine and Pharmacy
-
Distortions, Infrastructure And Labor Supply In Latin American Countries
The author documents differences in labor supply between a set of Latin American countries and the U.S. in the period 1990-2005. These differences are mostly explained by large differences in female l...
Provided By Universidad De La Republica
-
Security Model for Service-Oriented Architecture
In this paper, the authors examine how security applies to Service Oriented Architecture (SOA). Before they discuss security for SOA, let's take a step back and examine what SOA is. SOA is an architec...
Provided By Azad University
-
Tightly Secure Signatures and Public-Key Encryption
The authors construct the first public-key encryption scheme whose chosen-ciphertext (i.e., INDCCA) security can be proved under a standard assumption and does not degrade in either the number of user...
Provided By Karlsruhe Institute of Technology
-
Software Defined Radio in Public and Governmental Security Systems
Radio communication is crucial for Public and Governmental Security (P&GS) systems. No matter if a police officer waits for a radio message to get to his next scene or a firefighter needs to contact t...
Provided By Karlsruhe Institute of Technology
-
3D Media over Future Internet: Current Status and Future Research Directions
Future Media Internet has been designed to overcome current limitations and address emerging trends including: network architecture, content and service delivery across heterogeneous networks, diffusi...
Provided By International Journal of Computer Science Issues
-
Effectiveness and Limitations of Statistical Spam Filters
Spam is not only clogging the Internet traffic by consuming a hefty amount of network bandwidth but it is also a source for e-mail born viruses, spyware, adware and Trojan Horses. It is also used to c...
Provided By University Of Kashmir
-
A New Robust Cryptography Algorithm Based on Symmetric Key to Prevent Unauthorized Access to Contents of Encrypted Files
Cryptography has specific role to protect secret file from unauthorized access. Cryptography algorithms are classified in to two types. Symmetric-key producing and Public-key producing algorithms. In ...
Provided By International Journal of Computer Science Issues
-
Graphical Password Authentication Schemes: Current Status and Key Issues
Authentication is one the most important security primitive. Password authentication is most widely used authentication mechanism. Users generally use characters as passwords but text-based passwords ...
Provided By International Journal of Computer Science Issues
-
Improved Mobile WiMax Image Privacy Using Novel Encryption Techniques
Mobile WiMAX security standards from IEEE specify some powerful standards-based security controls, including PKMv2 EAP-based authentication and over-the-air AES-based encryption. But encryption techni...
Provided By International Journal of Computer Science Issues
-
Performance Analysis of Variable Energy Levels of Clustering Protocols for Wireless Sensor Network
Wireless Sensor Network (WSN) is a large network which is consist of huge number of sensor nodes and these nodes are directly interacting with their environment by sensing the physical parameters such...
Provided By International Journal of Computer Science Issues
-
Cognitive Sensor Techniques to Face Security Challenges in CWSN
Cognitive radio has emerged as the key technology to address efficient spectrum utilization challenge according to the increasing demand for wireless communication. Cognitive Wireless Sensor Networks ...
Provided By International Journal of Computer Science Issues
-
Managing Vulnerabilities in a Networked System
Intrusion Detection Systems are not easily constructed or maintained due to the almost daily evolution of network traffic and known exploits. The research in this paper evaluates it through analysis o...
Provided By International Journal of Computer Science Issues
-
An End-to-End Secure Mail System Based on Certificateless Cryptography in the Standard Security Model
Most of the existing mailing systems provide limited authentication mechanisms, including web trust model, password authentication or identity based cryptography. Few existing mailing systems found in...
Provided By International Journal of Computer Science Issues
-
Dynamic Matrices from Hardware Fingerprint and Its Application in Software Copyright Protection
Software copyright piracy can be a worldwide sticky question. This encourages vendors to develop various methods against it. In general, the concept of software includes all kinds of electronic docume...
Provided By International Journal of Computer Science Issues
-
A New Scheme Based Biometric to Protect Location Privacy in Wireless Body Area Networks
The Wireless Body Area Network (WBAN) has emerged as a new technology for e-healthcare that allows real time monitoring of patients using small wearable and/or implantable sensors. The latest collect ...
Provided By International Journal of Computer Science Issues
-
An Improved AES Masking Method Smartcard Implementation for Resisting DPA Attacks
Currently, side-channel analysis has become a hotspot of cryptographic analyses. Different from conventional cryptographic security analyses, side-channel analyses monitors the changes in the electron...
Provided By International Journal of Computer Science Issues
-
An Efficient Trojan Horse Classification (ETC)
For the past few years, malware or also known as malicious code is seen as one of the biggest threats of the cyber attacks. It has caused lot of damages, loss of money and productivity to many organiz...
Provided By International Journal of Computer Science Issues
-
A SMS Based Security Providing for an Email ID by Creating an Email Server
Email is a method of exchanging digital messages from an author to one or more recipients. Email communication is responsible for spreading the majority of virtual infections and poses one of the grea...
Provided By International Journal of Computer Science Issues
-
Communication and Control in Home Gateway
In this paper, the authors introduce the design of home gateway communication control part, including the network interface circuit, network interface driver, Client/Server (C/S) mode of communication...
Provided By International Journal of Computer Science Issues
-
A Proposed SOAP Model Against Wrapping Attacks and Insecure Conversation
The web services in SOA are under the heterogeneous ownership domains, there should be a uniform means to offer, discover and interact with each other. Ensuring interoperatability among the web servic...
Provided By International Journal of Computer Science Issues
-
A Robust and Secure Methodology for Network Communications
With the rapid development of a network multimedia environment, digital data can now be distributed much faster and easier. To maintain privacy and security cryptographic alone is not enough. In recen...
Provided By International Journal of Computer Science Issues