Now showing items 1-19 of 19

    • ACIDS: automated co-stimulation based intrusion detection system with a sense of dynamic self 

      Kamra, Pooja (Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
      Automated Co-stimulation based Intrusion detection system with a sense of Dynamic Self, or ACIDS, is a distributed architecture for intrusion detection systems. Other than the already used aspects of human immune systems ...
    • Contributions to parasitic computing 

      Jain, Rajul (Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
      Internet is a huge connection of networks. To ensure reliable communication on the Internet a layered architecture is used, with various protocols functional at each layer. The way these protocols are used on the Internet, ...
    • Energy efficient secret aggregation for wireless sensor networks 

      Jadia, Pawan K. (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      Sensor networks involves large amount of nodes spread over a region. Data aggre¬gation is an important technique for reducing the amount of data to be transmitted in the networks. Data confidentiality is a crucial requirement ...
    • Enhancement of misbehavior detection scheme for vehicular ad-hoc networks 

      Jain, Shefali (Dhirubhai Ambani Institute of Information and Communication Technology, 2012)
      Vehicular ad hoc networks (VANETs) will facilitate various safety and non-safety applications to be deployed in the future. A vehicle in a VANET can misbehave by sending false or inaccurate information to other vehicles. ...
    • Formal analysis of two standardized protocols using standard spaces 

      Soni, Shraddha (Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
      To achieve secure communication it is critical to provide protocols which are secure against attacks. Formal methods are helpful in finding whether or not a protocol is secure. The first formal method for this task, namely ...
    • Identification of an intelligent attacker in ARP spoofing 

      Singh, Subhash Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2012)
      ARP spoofing is a most powerful and simplest internal attack that can be done in internal network. There are many techniques have been proposed to secure Address Resolution Protocol (ARP). It includes cryptographic and ...
    • Improved algorithms for modular multiplication and its application to block cipher RC6 

      Agarwal, Shivani (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      This thesis explores the area of hardware implementation of block ciphers. An al¬gorithm for modular multiplication is proposed which is efficient in terms of speed and area. To demonstrate the effectiveness of the algorithm ...
    • Improved authentication packet marketing for IP trace-back 

      Rajput, Bhupendra (Dhirubhai Ambani Institute of Information and Communication Technology, 2013)
      IP Trace back is a significant technique for countering Denial of service attacks; it deals with the problem of finding the true source of packets, which takes part in a flooding based Denial of Service attack. Finding the ...
    • Improvement of RAD technique for detecting reflector based DoS attack 

      Basha, Shaik Mahaboob (Dhirubhai Ambani Institute of Information and Communication Technology, 2012)
      Distributed Reflector Denial-of-service (DRDoS) attack is a challenging problem in present Internet environment. DRDoS attack is entirely different when compared to DDoS attack. In DRDoS attack, no need to generate the ...
    • Improvement of tagged architecture for preventing software vulnerabilities 

      Shah, Tejaskumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
      In spite of the many defense techniques, software vulnerabilities like buffer overflow, format string vulnerability and integer vulnerability is still exploited by attackers. These software vulnerabilities arise due to ...
    • Modeling and detecting attacks against key agreement protocols 

      Yadav, Anshu (Dhirubhai Ambani Institute of Information and Communication Technology, 2012)
      Key agreement protocols establish a shared secret key between two or more communicating parties willing to exchange data over insecure channels using symmetric key cryptography. Based on the number of members involved ...
    • Multipath verification defense against SSL stripping attack 

      Arora, Sunil (Dhirubhai Ambani Institute of Information and Communication Technology, 2013)
      SSL stripping attack is a man- in- the- middle attack which poses a serious threat to the security of secure socket layer protocol. In SSL stripping attack the attacker has ability to downgrade security of SSL protected ...
    • Performance evaluation of kerberos cross-realm authentication using SIMNET 

      Sethi, Ankit Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      Today, the network is being implemented in such a manner that consist of geographi- cally diverse clients and distributed as well as centralized servers. To prevent unauthorized access to system resources such as servers, ...
    • Prolog based approach to reasoning about dynamic hierarchical key assignment schemes 

      Mundra, Anil Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      The problem of allowing the higher level users access the information related to lower level is called Hierarchical Access Control Problem. In a hierarchical access control system, users are partitioned into a number of ...
    • Protecting mobile agents against malicious hosts using trusted computing 

      Panchal, Niravkumar K. (Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
      The concept of mobile agents was invented about a decade ago. Since then, plenty of innovative applications of mobile agents have been proposed. But it remains to be the fact that these applications have not been deployed ...
    • Protecting structures on heap from buffer overflow vulnerabilities with TIED-LibsafePlus 

      Jain, Abhay (Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
      In spite of the numerous defenses that have been devised to combat the buffer overflow attack, buffer overflow vulnerability in the C programs still exist as the one widely exploited by the attackers to subsume the privileges ...
    • Secure and efficient key assignment scheme for dynamic access control in a hierarchy 

      Vadnala, Praveen Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2006)
      The users belonging to an organization are often assigned different access permissions depending on their security class. In this situation, the users belonging to a higher security class are allowed access to the information ...
    • Security analysis of two fair exchange protocols 

      Gahlot, Jai (Dhirubhai Ambani Institute of Information and Communication Technology, 2007)
      E-commerce applications enable two parties to exchange digital items electronically. It is critical for such applications that the underlying protocols ensure the fairness requirement: no honest participant should suffer ...
    • Traitor tracing for xml documents 

      Mandot, Ekata (Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
      Electronic documents are more easily copied and redistributed than paper documents. This is a major impediment to electronic publishing. One needs to think of various copy protection schemes for the documents. There are ...