Now showing items 1-15 of 15

    • Cache performance evaluation in DSR protocol through cross-layering for mobile ad hoc networks 

      Sharma, Kapil (Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
      Wireless mobile ad-hoc networks are being actively studied by many researchers these days. These networks are suitable to be used in various situations because of (i) their infrastructure-less property and (ii) the mobility ...
    • Comparative study between exponential back off and dynamic waiting strategies for medium access in wireless ad hoc networks 

      Shah, Rahul (Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
      IEEE 802.11 DCF (IEEE 802.11 Distributed Coordination Function) is widely used MAC protocol for wireless channel access. Although it is developed for single hop networks where all nodes are in the same radio range, it can ...
    • Cooperation enforcement mechanisms in wireless adhoc networks 

      Chaturvedi, Manish Shivshankar (Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
      Wireless adhoc networks are autonomous, infrastrutureless networks where there are no dedicated routers or base stations and nodes are expected to cooperate in Wireless performing routing duties to keep network connected. ...
    • Efficient ASIC implementation of advanced encryption standard 

      Joshi, Ashwini Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
      In spite of the many defense techniques, software vulnerabilities like buffer overflow, format string vulnerability and integer vulnerability is still exploited by attackers. These software vulnerabilities arise due to ...
    • Formal analysis of two standardized protocols using standard spaces 

      Soni, Shraddha (Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
      To achieve secure communication it is critical to provide protocols which are secure against attacks. Formal methods are helpful in finding whether or not a protocol is secure. The first formal method for this task, namely ...
    • Generalized data extraction protocol for habitat monitoring applications in WSNs 

      Hemnani, Deepak Manohar (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      Habitat monitoring applications use WSNs to gather data about environment and migration patterns of animals. This data is used by biologists to analyze the life and behavior of animals in different environments. The ...
    • Identifying small world network properties in ad-hoc networks 

      Garg, Neha (Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
      Small World Network is a densely connected network with low degree of separation. These types of networks have high clustering property like regular network as well as have low average path length like random network. Thus, ...
    • Packet forwarding strategies for cooperation enforcement in mobile wireless ad hoc networks 

      Patel, Nidhi (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      In self-organized ad hoc networks, all networking functions rely on the contri- bution of the relay nodes. Nodes have to forward packets for each other in order to enable multi-hop communication. In recent years, researchers ...
    • Performance analysis of TCP over enhanced UMTS network 

      Mathur, Rahul (Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
      The increase in demand and overwhelming response of 3G mobile networks has made it a technology which would drive the future of mobile communication. On the other hand the popularity of the Internet has also increased with ...
    • Performance evaluation of kerberos cross-realm authentication using SIMNET 

      Sethi, Ankit Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      Today, the network is being implemented in such a manner that consist of geographi- cally diverse clients and distributed as well as centralized servers. To prevent unauthorized access to system resources such as servers, ...
    • Prolog based approach to reasoning about dynamic hierarchical key assignment schemes 

      Mundra, Anil Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      The problem of allowing the higher level users access the information related to lower level is called Hierarchical Access Control Problem. In a hierarchical access control system, users are partitioned into a number of ...
    • Secure data delivery in mobile ad hoc network using multiple paths 

      Maheshwari, Mayur (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      A mobile ad hoc network (MANET) is a self configurable, self organized, infrastructure less multi hop mobile wireless network.Characteristics of ad hoc network make security a critical issue i.e. any node can join the ...
    • Security analysis of two fair exchange protocols 

      Gahlot, Jai (Dhirubhai Ambani Institute of Information and Communication Technology, 2007)
      E-commerce applications enable two parties to exchange digital items electronically. It is critical for such applications that the underlying protocols ensure the fairness requirement: no honest participant should suffer ...
    • Testbed based experimental analysis of transport protocols over wireless ad hoc networks 

      Shah, Harshil Anilkumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
      Ad hoc networks are networks with no infrastructure and self-organized in nature. ad hoc networks allow nodes to form network when they come into range of each other provided nodes are configured in ad hoc mode. But these ...
    • Web services policy in grid 

      Desai, Amee Anilbhai (Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
      Service-oriented computing enables service providers to publish their business functionalities in the form of abstract contracts, which can be discovered by service consumers based on open and standard protocols. Enterprise ...