CAPTCHAs (Completely Automated Public Turing test to tell computers and Humans Apart) are widespread security measures on the World Wide Web that prevent automated programs from abusing online services. CAPTCHAs are d...
详细信息
The tight computing constraints of low capacity mobile devices require lightweight cryptographic implementations.A software and hardware based performance analysis of cryptographic primitives: lightweight encryption/d...
详细信息
In a typical organization multiple authorities may participate in purchasing process. Online implementation of such system should properly distribute security control over multiple-authorities to ensure trust among th...
详细信息
Mobile Ad Hoc networks (MANETs) are vulnerable to having their optimality in variety of operations and calculations, compromised by various challenges. After an analysis on MANET routing, a load balancing and resource...
详细信息
distributedsystems and networks have been adopted by telecommunications, remote educations, businesses, armies and governments. A widely applied technique for distributedsystems and networks is the single sign-on (S...
详细信息
This report contains an analysis of the current states of art in the areas of vehicle location techniques, traffic handling protocols, network stability control, and security/authentication schemes. In particular, per...
详细信息
This report contains an analysis of the current states of art in the areas of vehicle location techniques, traffic handling protocols, network stability control, and security/authentication schemes. In particular, performance limitation of vehicle location systems operating in the ADDS network environment is discussed. A distributed architecture of automatic vehicle monitoring system is suggested. Arguments supporting the adoption of Transmission Control Program (TCP) and CCITT X. 25 in ADDS are presented. Routing and relay management schemes needed to support these subscriber-level protocols in distributed manner are designed. The different network stability problems are defined and their solutions discussed.
High security is one of leading restriction for shining up bright eras and vision of Cloud computing. In latest trend of Cloud, all the sensitive applications and data are moved towards cloud infrastructure and data c...
详细信息
Cloud computing paradigm provides computing and storage infrastructure for the clients to outsource their data and computation. This new computing paradigm poses several security challenges. We focus on the problem of...
详细信息
In this paper we reduce the communication and computation overhead involved in Leader Election for running Intrusion Detection System (IDS) for a cluster of nodes in mobile ad hoc networks using Mobile Agents. To redu...
详细信息
This paper defines a new protocol KeEs for the key establishment that meets the security requirements of the threat model proposed. The KeEs protocol assures forward and backward secrecy of the session key, so that if...
详细信息
暂无评论