Version-11 (March-April 2014)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Quantum Key Distribution Protocols: A Review |
Country | : | India |
Authors | : | Hitesh Singh, D. L. Gupta, A. K. Singh |
: | 10.9790/0661-162110109 |
Keywords: Quantum key distribution, BB84 protocol, BB92 protocol, SARG04 protocol, E91 protocol, COW protocol, DPS protocol, KMB09 Protocol, S09 protocol, S13 protocol.
[2]. E. Artur "Quantum cryptography based on Bell‟s theorem.", Physical review Letters, Vol. 67, No, 6,5 august 1991, pp 661-663.
[3]. D.Mayers, Journal. of ACM 48, 351 (2001), preliminary version in Mayers, D. Advances in Cryptology-Proc. Crypto 96, vol 1109 of Lecture Notes in Computer Science, Kobiltz, N.Ed.(Springer-Verlag, New York, 1996) pp. 343-357.
[4]. E.Biham, M.Boyer, P.O.Boykin, T.Mor and V.Roychowdhury, in Proc of the thirty second annual ACM symposium on theory of computing (Portland, Oregon, United States, 2000), pp. 715-724
[5]. H.K.Lo and H.F.Chau Science 283, 2050 (1999).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Analysis of Digital Image Splicing Detection |
Country | : | India |
Authors | : | P. Sabeena Burvin, J. Monica Esther |
: | 10.9790/0661-162111013 |
Keywords: image forensic, image forgery, image composition, image retouching, copy-move image forgery.
[2]. Types of digital image forgery, Available. https://www.google.co.in/?gfe_rd=cr&ei= HWocU7zx IOOD8Qf8wIDgCw#q=Types+of+digital+image+forgery.
[3]. http://www.slideshare.net/ahlamansari/image-forgery-and-security
[4]. Zhen zhang,ying zhou, jiquankang & yaan ren, "Study of digital image splicing detection", zhang zhen 660126.com, china.
[5]. http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/AuthSplicedDataSet.htm.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Mobile Ad hoc Networks (MANETs), Neighbour coverage Knowledge, ReBroadcast Techniques, Routing Overhead, NCPR.
[2] Xin Ming Zhang, En Bo Wang, Jing Xia, and Dan Keun Sung."A Neighbour Coverage based Probabilistic ReBroadcast for Reducing Routing Overhead in Mobile Ad hoc Networks", 2012.
[3] C. Perkins, E. Belding-Royer, and S. Das, "Ad hoc On-Demand Distance Vector (AODV) Routing," RFC 3561, 2003.
[4] B. Williams and T. Camp, "Comparison of Broadcasting Techniques for Mobile Ad Hoc Networks," Proc. ACM MobiHoc'02, pp. 194-205, 2002.
[5] J. Kim, Q, Zhang, and D. P. Agrawal, "Probabilistic Broadcasting Based on Coverage Area and Neighbour Confirmation in Mobile Ad hoc Networks," Proc. of IEEE GLOBECOM'04, 2004.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Secured Tagging [Redefining Spam Detection] |
Country | : | India |
Authors | : | S. Himaja, Dr. N. Chandra Sekhar Reddy, S. Srinivas |
: | 10.9790/0661-162111922 |
Keywords: Spam detection, Social Bookmarking, tags, spam factor.
[2] A. Jøsang, R. Ismail, and C. Boyd, "A survey of trust and reputation systemsfor online service provision," Decision Support Syst., vol. 43, no. 2, pp. 618–644,Mar. 2007.
[3] B. Markines, C. Cattuto, and F. Menczer, "Social spam detection," in Proc.ACMAIRWeb, Apr. 2009, pp. 41–48.
[4] I. Ivanov, P. Vajda , J.-S. Lee, L. Goldmann, and T. Ebrahimi, "Geotagpropagation n social networks based on user trust model," Multimedia Tools Applicat., pp.1–23, July 2010.
[5] F. Benevenuto, T. R odrigues, V. Almeida, J. Almeida, and M. Gonçalves,"Detecting spammers and content promoters in online video social networks," inProc. ACM SIGIR, July 2009, pp. 620–627.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Displaying All Bangla Compound Letters & Alphabets By 32-Segment |
Country | : | Bangladesh |
Authors | : | Shamsun Nahar, Fariha Jabin |
: | 10.9790/0661-162112327 |
Keywords: 32-segment display, alphabets, compound letters and numerals.
[2] Md. Abul Kalam Azad, Rezwana Sharmeen, Shabbir Ahmad and S. M. Kamruzzaman; "A Unique 10 Segment Display for Bengali Numerals",
[3] Sabbir Ahmed, Serazam Monira; "Designing a 10 segment display for Bangla and English numerals", 6th ICCIT 2004
[4] Ahmed Yousuf Saber, Mamun Al Murshed Chowdhury, Suman Ahmed, Chowdhury Mofizur Rahman; "Designing 11-Segment Display for Bangla Digit"s, 5th ICCIT 2002
[5] Al-Sakib Khan Pathan ,Md. Mahbub Alam, Mostafa Monowar, Forhad Rabbi, Sabbir Ahmed,Tareq Hasan Khan; "12-SEGMENT DISPLAY FOR BENGALI NUMERICAL CHARACTERS", National Conference on Computer Processing of Bangla (NCCPB-2004), pp. 82-88, Dhaka, Bangladesh, February, 2004
- Citation
- Abstract
- Reference
- Full PDF
Index terms: Cloud computing, Mobile cloud computing, data staging, data caching, data placement and replication.
[2] "MOBILE CLOUD COMPUTING AS FUTURE FOR MOBILE APPLICATIONS – IMPLEMENTATION METHODS AND CHALLENGING ISSUES" Shahryar Shafique Qureshi , Toufeeq Ahmad, Khalid Rafique2, Shuja-ul-islam, IEEE CCIS,2011
[3] H. Gupta and B. Tang, "Data Caching under Number Constraint," Proc. IEEE INFOCOM, 2006.
[4] A. Benoit, V. Rehn-Sonigo, and Y. Robert, "Replica Placement and Access Policies in Tree Network," IEEE Trans. Parallel and Distributed Systems, vol. 19, no. 12, pp. 1614-1627, Dec. 2008.
[5] M. Bienkowski, A. Feldmann, D. Jurca, W. Kellerer, G. Schaffrath, S. Schmid, and J. Widmer, "Competitive Analysis for Service Migration in Vnets," Proc. Second ACM SIGCOMM Workshop Virtualized Infrastructure System and Architectures (VISA), Sept. 2010.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Edge, Smooth, Noise, Thresold, Gradient.
[2]. A Research on Improved Canny Edge Detection Algorithm-Jun Li, Sheng Ding
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Improvising Data Locality and Availability in Hbase Ecosystem |
Country | : | India |
Authors | : | Shalini Sharma, Satyajit Padhy |
: | 10.9790/0661-162113641 |
Keywords: Data Locality, HRegion, HDFS, locality index, MapReduce, Region servers.
[2]. Y. Guo, Z. Pan, and J. Heflin, "LUBM: A benchmark for OWL knowledge base systems." Journal of Web Semantics, vol. 3, no. 2-3, pp. 158–182, 2005.
[3]. S. Nishimura, S. Das, D. Agrawal, and A. Abbadi, "Mdhbase: A scalable multi-dimensional data infrastructure for location aware services," in Mobile Data Management ( MDM), 2011 12th IEEE International Conference on, vol. 1. IEEE, 2011, pp. 7–16.
[4]. F. Chang, J. Dean, S. Ghemawat, W. Hsieh, D. Wallach, M. Burrows, T. Chandra, A. Fikes, and R. Gruber, "Bigtable: A distributed storage system for structured data," ACM Transactions on Computer Systems (TOCS), vol. 26, no. 2, p. 4 , 2008.
[5]. K. Muthukkaruppan, "HBase @ FacebookThe Technology Behind Messages," April 2012. [Online]. Available: http://qconlondon.com/dl/qcon-london-2011/
- Citation
- Abstract
- Reference
- Full PDF
Keywords: PAKE, Dictionary Attack, Diffie-Hellman Key Exchange, Elgamalencryption, Nonce.
[2]. J. Katz,P.MacKenzie,G.Taban, andV.Gligor, "Two-ServerPassword-Only Authenticated Key Exchange," Proc. AppliedCryptographyandNetworkSecurity(ACNS'05),pp. 1-16,2005.
[3]. Y.Yang, R.H. Deng, and F.Bao,"A Practical Password-Based Two-Server Authenticationand keyExchangeSystem," IEEE Trans DependableandSecureComputing, vol.3,no.2,pp. 105-114, Apr.2006.
[4]. H.Jin,D.S.Wong, andY. u,"AnEfficientPassword-OnlyTwo- Server AuthenticatedKey Exchange System," Proc.Ninth Int'l Conf.Information andComm.Security(ICICS'07),pp. 44-56,2007.
[5]. D. Jablon, "Password AuthenticationUsing Multiple Servers,"Proc.Conf.TopicsinCryptology: TheCryptographer's TrackatRSA (RSA-CT'01),pp. 344-360,2001.
- Citation
- Abstract
- Reference
- Full PDF
[2]. Ang, Zhi-Yang; Yuen, Chai Tong; Ng, Tze-Yu; Ng, Yee-Long; Ho, Jee-Hou; "Development of a multi-touch table for natural user interface", Sustainable Utilization and Development in Engineering and Technology (STUDENT), 2011 IEEE Conference, pp - 201 – 206
[3]. Saravanan, C., "Color Image to Grayscale Image Conversion", Computer Engineering and Applications (ICCEA), 2010 Second International Conference, pp - 196 – 199
[4]. S. S. A. Sheikh, S. M. Hanana, Y. Al-Hosany, and B. Soudan, "Design and implementation of an FTIR camera-based multitouch display," GCC Conference & Exhibition, 2009 5th IEEE, pp – 1-6.
- Citation
- Abstract
- Reference
- Full PDF
Journal Papers:
[2]. G. Anandharaj , Dr.R. Anitha "A Distributed Location Aware Cache Maintenance Technique for Mobile Computing Environments"
(Journal of Computational Information Systems 8: 7 (2012) 2839–2849))
Chapters in Books:
[3]. Sunho Lim Soo-Hoan Chae "On Improving The Robustness Of Partitionable Internet-Based Mobile Ad Hoc Networks"
(Computing and Informatics, Vol. 30, 2011, 429–446)
Proceedings Papers:
[4]. Jaeyeon Jung, Arthur W. Berger and Hari Balakrishnan "Modeling TTL-based Internet Caches, Pro"c. INFOCOM 2003. Twenty-
Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies (Volume:1 )
- Citation
- Abstract
- Reference
- Full PDF
[2]. A Servlet and JSP tutorial URL: http://www.apl.jhu.edu/~hall/java/Servlet-Tutorial/
[3]. http://en.wikipedia.org/wiki/Apache_Tomcat
[4]. http://wooservers.com/blog/2011/12/27/what-is-microsoft-sql-server/
[5]. http://en.wikipedia.org/wiki/Java_Database_Connectivity
[6]. Sun Microsystems, Java URL: http://java.sun.com/
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Survey on Data Annotation for the Web Databases |
Country | : | India |
Authors | : | Miss.Priyanka P.Boraste |
: | 10.9790/0661-162116870 |
[2]. Data Engineering, Vol. 25, No.3, 2013 N. Krushmerick, D. Weld, and R. Doorenbos, "Wrapper Induction Information Extraction," Proc. Int'l Joint Conf. Artificial Intelligence (IJCAI), 1997\ L. Liu, C. Pu, and W. Han, "XWRAP: An XML-Enabled Wrappe Construction System for Web Information Sources," Proc. IEEE
[3]. Conf. Data Eng. (ICDE), 2001W. Meng, C. Yu, and K. Liu, "Building Efficient and Effective Metasearch Engines," ACM Computing Surveys, vol. 34, no. 1, pp. 48- 89,2002
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Android Based Appointment Scheduler and Location Helper using file operation |
Country | : | India |
Authors | : | Kujur Preeti Nancy, Pooja |
: | 10.9790/0661-162117175 |
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Security Enforcement with query routing Information Brokering in Distributed Information Sharing |
Country | : | India |
Authors | : | A. Banu Prabha |
: | 10.9790/0661-162117682 |
[2]. RHIO models, with a focus on patient identification," Journal of AHIMA 77, pp. 64A–D, January 2006.
[3]. A. P. Sheth and J. A. Larson, "Federated database systems for managing distributed, heterogeneous, and autonomous databases," ACMComputing Surveys (CSUR), vol. 22, no. 3, pp. 183–236, 1990.
[4]. X. Zhang, J. Liu, B. Li, and T.-S. P. Yum, "CoolStreaming/DONet: A data-driven overlay network for efficient live media streaming," in
[5]. Proceedings of IEEE INFOCOM, 2005.A. C. Snoeren, K. Conley, and D. K. Gifford, "Mesh-based content routing using XML," in SOSP, pp. 160–173, 2001.
[6]. G. Koloniari and E. Pitoura, "Peer-to-peer management of XML data: issues and research challenges," SIGMOD Rec., vol. 34, no. 2, 2005.
- Citation
- Abstract
- Reference
- Full PDF
[2] A survey of trust in internet applications - tyronegrandison and morrissloman
[3] Secure and scalable replication in phalanx - dahlia malkhi, michael K. Reiter
[4] Thema: byzantine-fault-tolerant middleware forweb-service applications - michael G. Merideth, aruniyengar, thomasmikalsen, stefan tai, isabellerouvellou, priyanarasimhan
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Performance Analysis of Routing Protocols in MANET |
Country | : | Morocco |
Authors | : | Mohamed Otmani, Dr. Abdellah Ezzati |
: | 10.9790/0661-162118994 |
[2] Seema Vilas Bhujade, Prof. S. D. Sawant, ―Evaluation AODV, DSR and DSDV Protocol of MANET by USING NS-2‖, IJET, Volume 4 Issue 8- August 2013.
[3] D GEETHA, T SARIKA, ―Performance Analysis of TORA & DSR Routing Protocols in Mobile Ad-hoc Networks‖, IJECSE, Volume 2,Number 1.
[4] Basu Dev Shivahare, Charu Wahi, Shalini Shivhare, ― Comparison Of Proactive And Reactive Routing Protocols In Mobile Adhoc Network Using Routing Protocol Property‖, International Journal of Emerging Technology and Advanced Engineering , Volume 2, Issue 3, March 2012.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Music-Map: A Music Recommendation System Based On Data Mining Technique |
Country | : | India |
Authors | : | Basundhara Dey |
: | 10.9790/0661-1621195100 |
- Citation
- Abstract
- Reference
- Full PDF
[2]. Y. A. Huang and W. Lee, "Attack analysis and detection for ad hoc routing protocols," in The 7th International Symposium on Recent Advances in Intrusion Detection (RAID'04), pp. 125-145, French
[3]. Charles E. Perkins and Elizabeth M. Royer, "Ad-hoc On-Demand Distance Vector Routing ," 2nd IEEE workshop on mobile computing systems and applications, New Orleans, Louisiana, USAp. 90-100, Feb. 1999
[4]. Seung Yi and Prasad Naldurg, "Security-aware ad hoc routing for wireless networks ," 2nd ACM international symposium on Mobile ad hoc networking & computing, MobiHoc'01, 2001,p. 299 - 302
[5]. Charles Perkins and Elizabeth Royer, " Ad hoc On-Demand Distance Vector (AODV) Routing ," RFC 3561, 2003, p. 1-37
- Citation
- Abstract
- Reference
- Full PDF
Abstract: A mobile ad hoc network (MANET) is a self-configuring network that is formed automatically by a collection of mobile nodes. There is no centralized management. Both legitimate and malicious nodes can access the network, so there are many possible attacks in MANET. In a black hole attack, a malicious node attracts traffic towards it and drops all packets without forwarding to the destination. The security of the AODV protocol is compromised by a particular type of attack called black hole attack.
Keywords: mobile ad hoc network, legitimate node, malicious node, black hole attack.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In day to day life, messengers or chatting applications provide facility for instant messaging over the internet. Exchange of messages takes place in universally used languages like English, French, etc. where both the users know how to communicate in a common language. Thus chatting on mobile phones is a luxury when both the parties involved know a common language. Hence we have implemented ALLTALK™ which is a Windows 8 phone based chatting application which makes cross language communication possible using mobile programming and networking technology.This application will enable the communication between two persons irrespective of the language each user wishes to use individually.
[2]. Peter Saint-Andre., Streaming XML with Jabber/XMPP, Internet Computing, IEEE , 9(5), 2005, 82 - 89.
[3]. D. Stenberg, "History of IRC (Internet Relay Chat)," http://daniel.haxx.se/irchistory.html, Mar. 29, 2011.
[4]. C. Yudkowsky, "Byte of Success: An IM Strategy," http://accounting.smartpros.com/x37234.xml, Nov. 10th, 2004.
[5]. http://www.tml.tkk.fi/Publications/C/21/nie_ready.pdf
[6]. Vanessa Wang, Frank Salim, Peter Moskovits, Building Instant Messaging and Chat over WebSocket with XMPP, The Definitive Guide to HTML5 WebSocket, 4 (New York: Springer-Apress, 2013) 61-83.
[7]. Jongmyung Choi, Chae-Woo Yoo,The Internet of Things ,Connect with Things through Instant Messaging, 4 (New York: Springer-Springer Berlin Heidelberg, 2008) 276-288.
[8]. Peter Saint-Andre. Extensible Messaging and Presence Protocol (XMPP): Core. IETF RFC 3920, Oct 2004.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In this research we aim to design and validate Intrusion Detection Response System (IDRS) for a cyber physical system (CPS) comprising for controlling and protecting physical infrastructures. The design part includes host IDS, system IDS and IDS response designs. The validation part includes a novel model-based analysis methodology with simulation validation. Our objective is to maximize the CPS reliability or lifetime in the presence of malicious nodes performing attacks which can cause security failures. Our host IDS design results in a lightweight, accurate, autonomous and adaptive protocol that runs on every node in the CPS to detect misbehavior of neighbor nodes based on state-based behavior specifications. Our system IDS design results in a robust and resilient protocol that can cope with malicious,
Theses:
[2]. M. Anand, E. Cronin, M. Sherr, M. Blaze, Z. Ives, and I. Lee, "Security challenges in next generation cyber physical systems," in Beyond SCADA: Networked Embedded Control for Cyber Physical Systems. Pittsburgh, PA, USA: NSF TRUST Science and Technology Center, NOV. 2006.
[3]. Robert R. Mitchell III, Eric Cronin, Micah Sherr, Matt Blaze, Zachary Ives, Insup Lee "Design and Analysis of Intrusion Detection Protocols in Cyber Physical Systems" Institute Of Electrical And Electronics Engineers Of Computer Security, Vol.10,NO.2, November-2010.
[4]. Alvaro A. C´ardenas, Saurabh Aminy, Bruno Sinopoliz, Annarita Giani Adrian Perrigz Shankar Sastry "Challenges for Securing Cyber Physical Systems" VOL.25,NO.12,September-2010
- Citation
- Abstract
- Reference
- Full PDF
Abstract:Today's manufacturing industry requires product data management system (PDM) for efficient product development and production. Manufacturing industries must deal with competition, time to market, reduction of the cost of doing business, and rapid development of new services and products. To address these requirements industries must constantly reconsider and optimize the way they do business and change their systems and applications to support evolving business processes. In the part of the PDM solution, workflow management system facilitates creating and executing workflow and controlling, monitoring, optimizing and supporting business processes. This paper proposes an approach to implement web based manufacturing process planning workflow in a pressure die casting industry to overcome the bottleneck associated with the workflow of the company. The advantage of this work is its efficiency and flexibility of data management and the business processes are explicitly defined. Manufacturing process planning workflow has been implemented to support the business process of the pressure die casting industry.
[2]. Jae-Yoon Jung, Hoonate Kim, and Suk-Ho Kang ., Standards based approaches to B2B integration, Computer & Industrial vol. (2006) 321-334.
[3]. Itana Maria de Souza Gimenes, Fabrício Ricardo Lazilha, Edson Alves de Oliveira Junior, Leonor Barroca, A Component basedProduct Line for Workflow Management Systems, CLEI electronic journal, vol. 7(2004) paper 5.
[4]. Eynard, Thomas Gallet, Pierre Nowa, and Lionel Roucoules., UML based specifications of PDM product structure and workflow, Computers in Industry 55 (2004) 301–316.
[5]. [Miguel A. Laguna, Jose M. Marque, and Francisco J. Garcia, DocFlow: workflow based requirements elicitation, Information and Software Technology 45 (2003) 357–369.
[6]. Lerina Aversano, Gerardo Canfora , Andrea De Lucia, and Pierpaolo Gallucci., Business process reengineering and workflowautomation:a technology transfer experience, The Journal of Systems and Software 63 (2002) 29–44.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Enterprise Application Integration (EAI) involves several technologies; among them, the popular and recent one is Service Oriented Architecture (SOA). Mainly, SOA is used for developing loosely coupled distributed applications. Loosely coupled applications are a group of applications (to form EAI) which can operate independently of each other. The early SOA was achieved by using a number of architectures which include DCOM (Distributed Component Object Model),
[2] Controneo, D., Graziano, A., and Russo, S., "Security Requirements in Service Oriented Architectures for Ubiquitous Computing," Proceedings of the 2nd Workshop on Middleware for Pervasive and Ad-hoc Computing, ACM, 2004
[3] Noor A. Altaani, Ameera S. Jaradat, "Security Analysis and Testing in Service Oriented Architecture," International Journal of Scientific & Engineering Research, Volume 3, Issue 2, 2012
[4] Deven Shah and Dhiren Patel, "Architecture Framework Proposal for Dynamic and Ubiquitous Security in Global SOA," International Journal of Computer Science and Applications, Vol. 6, No. 1, pp. 40-52, 2009
[5] Dirk Krafzig, Karl Banke, Dirk Slama, "Enterprise SOA Service Oriented Architecture Best Practices," Pearson Education, Inc, USA, 2005
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Decisive Role Model For Data Association |
Country | : | India |
Authors | : | Anurag Bhardwaj, Ashutosh Bhardwaj |
: | 10.9790/0661-16211142145 |
Abstract: This paper focuses on defined rule based on the itemsets appearing in the database and their relationship among themselves. Features are extracted leading to data trends, patterns and associations. Constraining the selection of itemsets, the feature transaction set in reduced. The algorithm here integrates the support and confidence values for the itemsets leading to strong rule generation.
[2] Gupta, Himanshu. "Selection of views to materialize in a data warehouse."Database Theory—ICDT'97. Springer Berlin Heidelberg, 1997. 98-112.
[3] Wang, Jiawei Han Yongjian Fu Wei, et al. "DBMiner: A system for mining knowledge in large relational databases." Proc. Intl. Conf. on Data Mining and Knowledge Discovery (KDD'96). 1996.
[4] Agrawal, Rakesh, and Ramakrishnan Srikant. "Privacy-preserving data mining."ACM Sigmod Record 29.2 (2000): 439-450.
[5] Worboys, Michael. "Event‐oriented approaches to geographic phenomena."International Journal of Geographical Information Science 19.1 (2005): 1-28.
[6] Luo, Jiebo, Andreas E. Savakis, and Amit Singhal. "A Bayesian network-based framework for semantic image understanding." Pattern Recognition 38.6 (2005): 919-934.
[7] Huang, Jiejun, Heping Pan, and Youchuan Wan. "An algorithm for cooperative learning of Bayesian network structure from data." Computer Supported Cooperative Work in Design I. Springer Berlin Heidelberg, 2005. 86-94.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Secure and Efficient Key Management Scheme in MANETs |
Country | : | Saudi Arabia |
Authors | : | Abu Taha Zamani, Syed Zubair |
: | 10.9790/0661-16211146158 |
Abstract: InMobile ad hoc networks (MANETs) security has become a primary requirements.Thecharacteristics capabilities of MANETsexposeboth challenges and opportunities in achieving key security goals,such as confidentiality,access control,authentication, availability, integrity, and non-repudiation.Cryptographic techniques are widely used for secure communications in both TCP and UDPnetworks. Most cryptographic mechanisms, such as symmetric and asymmetric cryptography,often involve the use of cryptographic keys.
[2] Tanenbaum, A. (2003). Computer Networks, PH PTR.
[3] Zhou, L. and Haas, Z. (1999). Securing Ad Hoc Networks, IEEE Network Magazine vol.13, no. 6, pp.24-30.
[4] Wu, B., Chen, J., Wu, J., and Cardei, M. (2006). A Survey on Attacks and Countermeasures in MobileAd Hoc Networks.
Wireless/Mobile Network Security, Springer. Chapter 12.
[5] Yi, S., Naldurg, P., and Kravets, R. (2002). Security Aware Ad Hoc Routing for Wireless Networks.Report No.UIUCDCS-R-2002-
2290, UIUC.
[6] Luo, H. and Lu, S. (2004). URSA: Ubiquitous and Robust Access Control for Mobile Ad HocNetworks, IEEE/ACM Transactions
on Networking. vol. 12, no. 6, pp. 1049-1063.