Quantcast
Channel: Research Library - White Papers, Webcasts and Case Studies - TechRepublic
Browsing all 30 articles
Browse latest View live

PCI Compliance - No Excuses, Please

PCI Compliance is an area of particular concern for companies considering moving some of their activities onto the Cloud. This paper discusses how such concerns are really nothing new, that they...

View Article



PKC Scheme Based on DDLP

This paper introduces the concept of public key cryptosystem, whose security is based on Double Discrete Logarithm Problem (DDLP) with distinct discrete exponents in the multiplicative group of...

View Article

Defending IP Spoofing Attack and TCP SYN Flooding Attack in Next Generation...

Multi-hop wireless networks are normally affected by TCP SYN flooding and IP address spoofing attacks. TCP SYN flooding occurs while establishing a TCP connection for data transmission. But, even...

View Article

Hierarchical Wireless Mesh Networks Scalable Secure Framework

Wireless Mesh Networks (WMNs) are more scalable than any other wireless networks, because of its unique features such as interoperability, integration and heterogeneous device support. Lacks of...

View Article

Codes Correcting Blockwise S-Periodic Errors

In most memory and storage system, the information is stored in various parts of the code length, known as sub-blocks. So, when error occurs in such a system, it does in a few places of the same...

View Article


Directional Antenna Assisted Scheme to Reduce Localization Error in Wireless...

The existing omni directional antenna assisted schemes for localization of sensors in Wireless Sensor Networks (WSNs) are not very accurate due to various constraints, since issues like sensor...

View Article

An Architecture of Hybrid Intrusion Detection System

Intrusion Detection System (IDS) is renowned and widely-deployed security tool to detect attacks and malicious activities in information system. It is an essential element of any contemporary...

View Article

Securing Wireless Grids: Architecture Designs for Secure WiGLET-to-WiGLET...

Wireless grids are ad-hoc dynamic sharing of physical and virtual resources among heterogeneous devices. In order for wireless grids to be secure, the main communication device called a WiGLET...

View Article


Evolutionary Computation Guided Energy Efficient Key Organization in Wireless...

In this paper an Evolutionary Computation based Energy Efficient novel Key Organization (ECEEKO) policy has been proposed by incorporating computational safety, power management and restricted...

View Article


Identifying Phishing Threats in Government Web Services

The governmental use of web technologies, including e-Government, has many advantages for citizens, but progress in this relationship has highlighted information security as an important issue in...

View Article

Construction Efficiency of the Elliptic Curve Cryptosystem Using Code...

This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted in Internet. A new secure scheme based on matrix scrambling using...

View Article

Service-Oriented Management for Internet of Things

Considering the popularity of Internet of Things, this paper discusses its management problem from the viewpoint of "Management as a Service", and proposes a service-oriented management solution...

View Article

An Optimal Sinsing Algorithm for Multiband Cognitive Radio Network

In cognitive radio networks, the biggest problem preventing optimum performance is the optimal setting of individual decision thresholds while keeping the interference on the primary network...

View Article


Modeling and Verification of Access Rights in Take-Grant Protection Model...

Take-Grant Protection Model (TGPM) is a powerful method for modeling access rights in a wide range of systems. It is graph based formal method that can be used for studying situations that rights...

View Article

W2BC: A Proposal for a Converged Baseband Implementation of WiMax and WiFi...

There have been many attempts to converge wireless teraservers functionality and implementation at various layers. This paper is to explore the similarities of the OFDM signals, as used in WiMax...

View Article


An Efficient RSA Cryptosystem with BM-PRIME Method

The RSA cryptosystem due to Rivest, Shamir and Adleman is one of the most popular public key cryptosystem and widely used to ensure privacy and authenticity of electronic data. Using more than two...

View Article

Solving the File Allocation Problem in the Distributed Networks by Using...

Average Distributed Program Throughput (ADPT) of the Distributed Computing System (DCS) depends mainly on the allocation of various resources. One of the important resources to be allocated on a...

View Article


Reduction Techniques of Peak-to-Average Power Ratio in MCCDMA Systems

The high Peak-to-Average Power Ratio (PAPR) is one of the main disadvantages of Multi-Carrier Code Division Multiple Access (MCCDMA) system. To reduce the PAPR of multi-carrier CDMA signals, a lot...

View Article

Web-Based solution for Mapping Application using Open-Source Software Server

Web GIS is an advance technology to manage and display all geographical locations on the earth surface. This paper deals with road analysis, to find the shortest path of route etc. so that these...

View Article

Analysis Quality of Service from Internet Protocol Television (IP TV) Service

IPTV was convergency product between broadcasting, telecommunication and information technology because it gave multimedia service such as TV broadcasting, video, audio, text, and data transmitted...

View Article
Browsing all 30 articles
Browse latest View live




Latest Images