作者:
Mattam, ManjunathMSIT Division
International Institute of Information Technology Gachibowli Hyderabad Andhra Pradesh 500 032 India
This paper proposes a model (architecture and protocol) that will help in securing assignment submissions into learning management systems. A client server architecture that uses cryptography is proposed to transform ...
详细信息
Monitoring a large-scale wireless sensor networks (WSN) is very difficult, not only because it is large and complex, much of difficulty comes from the lack of visual analysis tools. This paper describes snds (Sensor N...
详细信息
Due to severe DRM failures and the urgent demand for a better solution to solve the existing DRM systems vulnerabilities, this paper discusses the current DRM status, stressing system security objectives and requireme...
详细信息
Xiaoyu et. al. [1] presented efficient identity based (K, n) threshold signcryption scheme. In this paper, we present variant of [1] with group shared unsigncryption, which is based on discrete logarithm problem in fi...
详细信息
In the next generation of wireless communication systems, there will be a need for the rapid deployment of independent mobile users. Such network scenarios cannot rely on centralized and organized connectivity, and ca...
详细信息
CAPTCHA stands for Completely Automated Public Turing test to distinguish computers and Humans apart. CAPTCHA is a program which can generate and grade the tests that it itself cannot pass. The security aspect of CAPT...
详细信息
In this Information Age, security of personal data is one of the biggest issues faced by most of the nations. Biometrics provides substantial help in guarding against attempts to establish fraudulent multiple identiti...
详细信息
In this paper, we present a new generic cryptographic hash function testing tool called Crypto-Precision. It is designed to be adaptable to various Cryptographic Hash Function algorithms and different hash function co...
详细信息
This paper presents a high performance reconfigurable hardware implementation of speech scrambling-descrambling system which can be used for military and high security environments. The scrambling algorithm is based o...
详细信息
Last two decades have witnessed tremendous growth of internet and it acts as a centrifugal force for a whole new array of applications and services which drives the e- business/ commerce globally. Millions of applicat...
详细信息
暂无评论