Security
What's worse than getting hit with a security breach? Getting hit with an easily preventable one.
-
Mitigating DoS Attack in VPN
VPN provides confidentiality, integrity and availability through tunneling and encryption. Protocols used in VPN provide various security features but it does not provide any protection against Denial...
Provided By Creative Commons
-
I-FOO: An Enhancement to FOO Protocol
Various e-voting protocols have been proposed by researchers, while a few numbers of them are suitable to be implemented and utilized as an Internet-voting schema. Among these protocols, the FOO Error...
Provided By Shahara D. Wright
-
STEGCRYP: A Multilevel Information Security Shceme
In this paper, Cryptography and Steganography techniques are combined to enhance the security level of data communication over an unsafe distributed network. The standard LSB (Least Significant Bit) s...
Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)
-
Securing a Firm's Computer Operating System : Trusted Platform Module
Recently Trusted Platform Module (TPM) is emerged as a new solution to secure computers and other systems. It is a small microchip that enables encryption and stores authentication information in comp...
Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)
-
Review of DDoS and Flooding Attacks in MANET
The flooding and DDoS (Distributed Denial of Service) attacks are acts as major threats for MANET because of its ability to create huge amount of unwanted traffic. It is very difficult to detect and r...
Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)
-
New Multimodal Biometric Approach with Two Score Level Combination Strategies
Biometrics is the science of verifying the identity of an individual through physiological measurements or behavioral traits. Since biometric identifiers are associated permanently with the user they ...
Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)
-
Buffer Overflow Attack Blocking Using MCAIDS - Machine Code Analysis Intrusion Detection System
MCAIDS-Machine Code Analysis Intrusion Detection System for blocking code-injection buffer overflow attack messages targeting at various Internet services such as web service. With the increasing acce...
Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)
-
Survey on Authentication Password Techniques
Authentication is process of determining whether someone or something is, in fact who or what to be declared. For authentication mostly textual passwords are used. Passwords are the most commonly used...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Implementing Security Consideration in Dynamic Source Routing
Security has become one of the major issues for data communication over wired and wireless networks. To enhance the security of data transmission, existing system works on the cryptography based algor...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Robust Code Based Fault Tolerant Architecture Using OFB Mode for Onboard EO Satellites
The demand to protect the sensitive and valuable data transmitted from satellites to ground has increased and hence the need to use security algorithm on board in Earth Observation satellites also inc...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Towards a Perspective of Web Application Vulnerabilities and Security Threats
The rapid and tremendous growth of Information and Communication Technology (ICT) has increased access to web applications. This increased access has paved the way for disadvantageous security and vul...
Provided By International Journal of Computer Science and Telecommunications
-
Human Identification Using Finger Print and Face Biometrics
The objective is to compared at feature extraction level for face and fingerprint biometrics. The proposed approach is based on a compared to identify the human through, finger prints in automated man...
Provided By IJCSMR
-
Various Methods Used for the Protection, Detection and Prevention of Application Layer DDOS Attacks
Among all the attacks that occur on a web application like SQL Injection, XSS (Cross Site Scripting) attacks, DDOS attacks, etc., DDOS are the most difficult to detect and prevent. DDOS attacks occur ...
Provided By IJCSMR
-
Generating Cryptosystem for Multimodal Biometrics Based on Feature Level Fusion
Multi-biometrics are used worldwide because there will be low error rate and large population coverage. Multi-biometric data are stored in template and these template needs to be protected. There are ...
Provided By IJCSMR
-
Decision Tree Based IDS Implementation: Review
Network security technology has become crucial in protecting government and industry computing infrastructure. Modern intrusion detection applications face complex requirements - they need to be relia...
Provided By IJCSMR
-
An Adaptive Intrusion Detection Model Based on Machine Learning Techniques
Intrusion detection continues to be an active research field. Even after 20 years of research, the intrusion detection community still faces several difficult problems. Detecting unknown patterns of a...
Provided By Universiti Teknikal Malaysia Melaka
-
Security Issues and Accuracy Concerns in Information Retrieval Process
An approach towards information retrieval process security issues and the accuracy of the retrieved data of the retrieved data from the user perspective are the major concerns of this paper. Implanted...
Provided By International Journal of Computer Applications
-
Implementation of Modified Twofish Algorithm using 128 and 192-bit keys on VHDL
Now-a-days internet is one of the most important sources of communication and thousands of people interact electronically. For sending sensitive messages over the internet, the authors need security. ...
Provided By International Journal of Computer Applications
-
Feature Level Fusion of Multimodal Biometrics and Two Tier Security in ATM System
Unimodal biometrics uses a single source of biometric system for personal identification. It has a variety of problems such as noise in the sense data, Intra-class variations, Inter-class similarities...
Provided By International Journal of Computer Applications
-
Analysis of Mesh Topology of NoC for Blocking and Non-blocking Techniques
Network on Chip is efficient on-chip communication architecture for system on chip architectures. It enables the integration of a large number of computational and storage blocks on a single chip. The...
Provided By International Journal of Computer Applications
-
High Secured and Authenticated Secret Message Sending Using TIRI-DCT-DWT Based Iris Recognition and Steganography
In the world of modern communication, securing information is a very important task. Hence Cryptographic systems are integral parts of communication systems in majority applications. Security requirem...
Provided By International Journal of Computer Applications
-
Area Efficient Counting Bloom Filter (A-CBF) design for NIDS
An interesting target for the intruders is computers, since valuable data are fed into it. The need for impeccable intrusion detection system is growing every day. Hardware based Network Intrusion Det...
Provided By International Journal of Computer Applications
-
Developing a New Hybrid Cipher Using AES, RC4 and SERPENT for Encryption and Decryption
In this paper, the authors aim to developing a new hybrid cipher by combining the characteristics of 3 ciphers namely AES (Advanced Encryption Standard), Rc4 (also known as ARC4) and Serpent. The char...
Provided By International Journal of Computer Applications
-
An Axiomatic Approach for Secure Data Transmission
Cryptography is the strongest link in the chain of security since it plays an integral role in secure communication. Symmetric key cryptography is the oldest form of cryptology in which identical keys...
Provided By International Journal of Computer Applications
-
An Efficient Model for Securing Identity Access in Scalable System
In this paper, the authors propose an identity management system model which will ensure secure storage and retrieval of the IDs information in the scalable identity database. The proposed model uses ...
Provided By International Journal of Computer Applications
-
User Authentication System Using Cryptography Involving Arithmetic Operations
The concept of having to identify an entity before being allowed to perform any action is quite acceptable, and expected, and required in today's wired world. Password managers, graphical systems, pat...
Provided By International Journal of Computer Applications
-
Survey and Design Approach of Protocol Steganography in IPv6
Steganography is the process of hiding message in another cover medium such that it is difficult to detect. Cover medium is used as a carrier. This carrier can be Image, video, text or IP packet. Cove...
Provided By International Journal of Computer Applications
-
Prevention of Worm at Router Level for Providing Seamless Communication in Network Environment
Worm is the major hurdle, which restricts the comfortable communication in any networks. Worm is a malicious software program that destroys the normal communication in the networking systems. Every sy...
Provided By Engg Journals Publications
-
Multilayer Intrusion Detection System in Web Application Based Services
Web based services having a data transfer from different layer. Web services separate layer for the data transfer and the process is difficult in the service. Service transferring data is having intru...
Provided By Engg Journals Publications
-
An Analysis of Current Computer Network Attack Procedures, Their Mitigation Measures and the Development of an Improved Denial of Service (DOS) Attack Model
This paper presents the major network attack profiles, taxonomies, classification and identification frameworks. Further, current approaches for intrusion detection on networks were x-rayed though, wi...
Provided By Engg Journals Publications
-
A Stationary Wavelet Transform Approach for Improved Fingerprint Recognition Scheme
Fingerprint recognition, a known biometrics for personal identification is used in securing confidential data contents. Fingerprint exhibits textured like patterns of whorls, loop etc in sector form w...
Provided By Engg Journals Publications
-
Fuzzy Modelling of a Network Denial of Service (DOS) Attack Phenomenon
This paper presents the fuzzy modeling of a network Denial of Service (DoS) attack characteristics. Conventional methods for achieving same purpose were showcased. Also, the need for a fuzzy logic app...
Provided By Engg Journals Publications
-
An Intelligent Intrusion Detection for Detecting Unauthorized Malware Over the Network
Monitoring Internet traffic is critical in order to acquire a good understanding of threats and in designing efficient security systems. It is the most important issue to monitor the traffic in intern...
Provided By Engg Journals Publications
-
Security Vulnerabilities in Web Application - An Attack Perspective
Security is the essential and important topic in web applications. The choice of communication made the web technology an essential one in the environment. The importance of web application and its se...
Provided By Engg Journals Publications
-
Cryptography on Android Message Applications - A Review
Short Message Service (SMS) is a text messaging service component of phone, web, or mobile communication systems, using standardized communications protocols that allow the exchange of short text mess...
Provided By Engg Journals Publications
-
Enhancement of Biometric Template Security in Multibiometric Systems
Security is a very important aspect in the biometric systems. Biometric characteristics are unique to an individual hence the compromise of the biometric template is permanent. Attackers mostly attack...
Provided By Lovely Professional University
-
Survey Report: Insights on Endpoint Security and Stealthy Threats
This report captures key findings from a survey of 400 IT professionals, including 200 in the United States and 200 in the U.K., that can help you understand how your peers are managing endpoint secur...
Provided By Intel/McAfee
-
Whitepaper: The Inevitable Extinction of PSTs
Microsoft® Exchange administrators are responsible for the integrity, security, and availability of an organization's email platform. Some of the most common threats to mailboxes are viruses, spam, an...
Provided By Symantec Australia
-
Practical Options for Deploying IT Equipment in Small Server Rooms & Branch Offices
Small server rooms and branch offices are typically unorganized, unsecure, hot, unmonitored, and space constrained. These conditions can lead to system downtime or, at the very least, lead to “close c...
Provided By APC by Schneider Electric
-
Secure Relay Selection Based on Learning With Negative Externality in Wireless Networks
In this paper, the authors formulate relay selection into a Chinese restaurant game. A secure relay selection strategy is proposed for a wireless network, where multiple source nodes send messages to ...
Provided By EURASIP
-
Centralized Authentication Services
Centralized Authentication Service (CAS) is a single sign-on protocol for the web. Its purpose is to permit a user to log into multiple applications simultaneously and automatically. It also allows we...
Provided By Panimalar Engineering College
-
Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications
Watermarking embeds ownership information in digital content. Watermark describes information that can be used to prove the ownership of relational database. Here the embedding is hidden that the pres...
Provided By Panimalar Engineering College
-
Provide Secure Authenticity for Propagating Information
The data transfers using internet via E-mail is rapidly growing. So many business people and individuals using internet to transfer the documents (e.g., letters, certificates etc.). Security is an imp...
Provided By Panimalar Engineering College
-
Location-Based Services Routing in Networks
Due to the nature of spatial queries, an LBS needs the user position in order to process her requests. On the other hand, revealing exact user locations to a (potentially untrusted) LBS may pinpoint t...
Provided By Panimalar Engineering College
-
Security Analysis and Performance Evaluation of Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers
An efficient threshold signature scheme solves the difficulties of the receiver to proof the approval of the document from the sender as well as detecting if the file has been altered by illegitimate ...
Provided By mecs-press
-
Capital Flows To Developing Countries In A Historical Perspective: Will The Current Boom End With A Bust?
At a time when the worst seems to be over, DEEs are receiving strong destabilizing impulses from AEs, notably the US, through capital flows triggered by their self-centred responses to the crisis. Bub...
Provided By South Centre
-
Efficient Privacy Preserving Protocols for Decentralized Computation of Reputation
Reputation systems represent a key technology for securing distributed applications from misuse by dishonest entities. A reputation system computes reputation scores of the entities in the system, whi...
Provided By Purdue Federal Credit Union
-
A Sensor-Cyber Network Testbed for Plume Detection, Identification, and Tracking
Detection, Identification, and Tracking (DIT) problems that arise in applications such as the protection of people and the environment against radiational, biological, and chemical plumes can be solve...
Provided By Purdue Federal Credit Union
-
Extended Abstract: Cipher Techniques to Protect Anonymized Mobility Traces from Privacy Attacks
The authors study the problem of privacy protection of openly published mobility traces of people and other real-world entities, beyond standard protection techniques of anonymization and spatial/temp...
Provided By Purdue Federal Credit Union
-
Monitoring and Managing Cloud Computing Security using Denial of Service Bandwidth Allowance
Over the next decade, cloud computing has a good chance of becoming a widely used technology. However, many challenges face the cloud to be overcome before the average user or business team will trust...
Provided By Purdue Federal Credit Union
-
A Trust-Based Approach for Secure Data Dissemination in a Mobile Peer-to-Peer Network of AVs
Mobile Peer-To-Peer networks of Aerial Vehicles (AVs) have become significant in collaborative tasks including military missions and search and rescue operations. However, the nature of the communicat...
Provided By Purdue Federal Credit Union
-
Cyber-Physical Trade-Offs in Distributed Detection Networks
The authors consider a network of sensors that measure the scalar intensity due to the background or a source combined with background, inside a two-dimensional monitoring area. The sensor measurement...
Provided By Purdue Federal Credit Union
-
Two Bitcoins at the Price of One - Double-Spending Attacks on Fast Payments in Bitcoin
Bitcoin is a decentralized payment system that is based on Proof-of-Work. Bitcoin is currently gaining popularity as a digital currency; several businesses are starting to accept Bitcoin transactions....
Provided By NEC Laboratories
-
Identities in the Future Internet of Things
There are two problem areas of the current Internet to be solved in Future Internet scenarios - security and putting the user back in control despite the move to the Internet of things. With this in m...
Provided By NEC Laboratories
-
PUFs: Myth, Fact or Busted? a Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon
Physically Unclonable Functions (PUFs) are an emerging technology and have been proposed as central building blocks in a variety of cryptographic protocols and security architectures. However, the sec...
Provided By Technische Universitat Clausthal
-
Long Term Confidentiality: A Survey
Consider the following scenario: Alice encrypts her data today using the most trusted computationally secure cryptosystem. An adversary Eve gains access to the encrypted data and stores it in a safe p...
Provided By Technische Universitat Clausthal
-
A Publicly-Verifiable Mix-Net with Everlasting Privacy Towards Observers
In this paper, the authors present a novel, publicly verifiable mixing scheme which has everlasting privacy towards observers: all the information published on the bulletin board by the mixes (audit i...
Provided By Technische Universitat Clausthal
-
Modular Design and Analysis Framework for Multi-Factor Authentication and Key Exchange
An authentication factor is used to produce some evidence that an entity at the end of the communication channel is the one which it claims to be. Modern computer security knows different types of aut...
Provided By Technische Universitat Clausthal
-
Survey on Data Mining Techniques in Intrusion Detection
Intrusion Detection (ID) is the main research area in field of network security. It involves the monitoring of the events occurring in a computer system and its network. Data mining is one of the tech...
Provided By International Journal of Scientific & Engineering Research
-
Towards Analysis of Vulnerabilities and Measuring Security Level of Computer Network Life Cycle
To measure the overall security of a network, a crucial issue is to correctly compose the measure of individual components. Incorrect compositions may lead to misleading results. The detection of vuln...
Provided By International Journal of Scientific & Engineering Research
-
Segmentation Techniques for Iris Recognition System
A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by the individual. Iris recognition is regarded as the most reliable and acc...
Provided By International Journal of Scientific & Engineering Research
-
Smart Home Security System Using Fuzzy Logic
Secure home provide a sense of security to its owner. Home security has two aspects, inside and outside. Inside security covers the concept of securing home from threats like fire etc. whereas, outsid...
Provided By International Journal of Scientific & Engineering Research
-
Improved Password Selection Method to Prevent Data Thefts
Password thefts have become an important data security issue in the recent times. Hackers have been intruding into the websites and personal mail accounts of the users. Prevention from this unauthoriz...
Provided By International Journal of Scientific & Engineering Research
-
Implementation of RSA Cryptosystem Using Verilog
The RSA system is widely employed and achieves good performance and high security. In this paper, the authors use Verilog to implement a 16-bit RSA block cipher system. The whole implementation includ...
Provided By International Journal of Scientific & Engineering Research
-
Cyber Social-Networks and Social Movements Case Study: Tehran (2009-10)
While communication scholars suggest that cyber social networks can serve as an important resource for social movement communication, few studies examine which and how special features of these social...
Provided By International Journal of Scientific & Engineering Research
-
USENET: Internet news Software, Security - Needs and Goals
Usenet is a distributed bulletin board system, built as a logical network on top of other networks and connections. By design, messages resemble standard Internet electronic mail messages as defined i...
Provided By International Journal of Scientific & Engineering Research
-
FPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E
Data Security is an important parameter for the industries. It can be achieved by Encryption algorithms which are used to prevent unauthorized access of data. Cryptography is the science of keeping da...
Provided By International Journal of Scientific & Engineering Research
-
Importance of Intrusion Detection System (IDS)
Intruders computers, who are spread across the Internet have become a major threat in the people world, The researchers proposed a number of techniques such as (firewall, encryption) to prevent such p...
Provided By International Journal of Scientific & Engineering Research
-
Symantec Internet Security Threat Report
An annual report sponsored by Symantec detailing the trends of Internet security threats for the year 2010. Provides extensive facts and figures establishing these threats, as compiled from the Symant...
Provided By CDW & Symantec
-
New Approach for Detecting Intrusions
This paper describes how multi-agent systems can help to solve a complex problem such as security and more precisely intrusion detection. Intrusion Detection System (I.D.S) is a component of the secur...
Provided By International Journal of Scientific & Engineering Research
-
FPGA Implementation of RSA Encryption Engine with Flexible Key Size
An approach to develop the FPGA of a flexible key RSA encryption engine that can be used as a standard device in the secured communication system is presented. The VHDL modeling of this RSA encryption...
Provided By NORTH ATLANTIC UNIVERSITY UNION
-
UCAIPM: Ubiquitous Computing Agile Information Protection Mechanism
In order to improve the security of ubiquitous computing system, UCAIPM, a new novel ubiquitous computing agile information protection mechanism is presented. The protected information includes the id...
Provided By NORTH ATLANTIC UNIVERSITY UNION
-
Anatomy of a Data Breach
A whitepaper documenting enterprise security. Touches on the risks of data breaches, why these breaches occur, and what companies can do to protect their sensitive information.
Provided By CDW & Symantec
-
Cipher Text to Be Transmitted and Cryptanalysis in Network Security
In this paper, the authors propose an encryption algorithm to encrypt plaintext to cipher text. They divide plaintext into numeric and non-numeric fields, also, they pack the numeric fields to produce...
Provided By NORTH ATLANTIC UNIVERSITY UNION
-
Adaptive Quantization of Wavelet Packet Coefficients for Embedding and Extraction of Digital Watermarks
In this paper, a robust digital image watermarking approach of embedding and extraction of digital watermarks using adaptive quantization of wavelet packet coefficients was proposed. The original imag...
Provided By NORTH ATLANTIC UNIVERSITY UNION
-
Creating a Service Oriented Architectural Model for Emergency Vehicles
Finnish police cars have about 40 different user interfaces (radio, navigation, command and control systems, radar, alarm lights, etc.) on the deck beyond the cars' standard user interfaces. In cold w...
Provided By NORTH ATLANTIC UNIVERSITY UNION
-
Fingerprint Watermark Embedding by Discrete Cosine Transform for Copyright Ownership Authentication
In respect to the issues on protecting intellectual property, particular for artistic works in electronic form, some sorts of techniques could be put on a copyright material image to ensure its owners...
Provided By NORTH ATLANTIC UNIVERSITY UNION
-
A Logic for Automatic Verification of Cryptographic Protocols
In this paper, a new first-order logical framework and method of formalizing and verifying cryptographic protocols is presented. From the point of view of an intruder, the protocol and abilities of th...
Provided By NORTH ATLANTIC UNIVERSITY UNION
-
Validation Methods of Suspicious Network Flows for Unknown Attack Detection
The false rate of the detection methods which are based on abnormal traffic behavior is a little high and the accuracy of the signature generation is relatively low. Moreover, it is not suitable to de...
Provided By NORTH ATLANTIC UNIVERSITY UNION
-
H/W Based Stateful Packet Inspection Using a Novel Session Architecture
Stateful Packet Inspection(SPI) remember the previous packet and can thus keep track of the state of the session. SPI was originally developed for Firewall. But recently there are various applications...
Provided By NORTH ATLANTIC UNIVERSITY UNION