Now showing items 1-15 of 15

    • Automatic Compact Alphanumeric Encoding of Shellcode 

      Patel, Arohi (Dhirubhai Ambani Institute of Information and Communication Technology, 2016)
      Shellcode is a machine code that is injected in the form of a string to exploit buffer overflows. It generally contains non-ASCII bytes as not all machine instructions have their encoding bytes in ASCII range. To mitigate ...
    • Collusion resistant fingerprinting 

      Juneja, Sandeep (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      Digital watermarking is used to carry information by embedding information into the cover data in a perceptually visible or non visible manner. In today's sea of digital information, there are many problems associated ...
    • Contributions to parasitic computing 

      Jain, Rajul (Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
      Internet is a huge connection of networks. To ensure reliable communication on the Internet a layered architecture is used, with various protocols functional at each layer. The way these protocols are used on the Internet, ...
    • Effect of channel asymmetry on reputation based cooperation mechanisms in mobile ad-hoc networks 

      Vasavada, Tejas (Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
      Enforced cooperation among MANET nodes is an active research issue. In applications, where the users have different goals and there is no central authority to control them, users may become selfish. These nodes may not ...
    • Efficient ASIC implementation of advanced encryption standard 

      Joshi, Ashwini Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
      In spite of the many defense techniques, software vulnerabilities like buffer overflow, format string vulnerability and integer vulnerability is still exploited by attackers. These software vulnerabilities arise due to ...
    • Formal analysis of two standardized protocols using standard spaces 

      Soni, Shraddha (Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
      To achieve secure communication it is critical to provide protocols which are secure against attacks. Formal methods are helpful in finding whether or not a protocol is secure. The first formal method for this task, namely ...
    • hybrid approach to digital image watermarking using informed coding, informed embedding and spread spectrum 

      Dey, Nayan Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2006)
      The growth and popularity of the Internet has led to the data storage of multimedia data (audio, image and video) in digital form. The digitization form of multimedia data can be copied easily and then distributed again ...
    • Modeling and detecting attacks against key agreement protocols 

      Yadav, Anshu (Dhirubhai Ambani Institute of Information and Communication Technology, 2012)
      Key agreement protocols establish a shared secret key between two or more communicating parties willing to exchange data over insecure channels using symmetric key cryptography. Based on the number of members involved ...
    • Multipath verification defense against SSL stripping attack 

      Arora, Sunil (Dhirubhai Ambani Institute of Information and Communication Technology, 2013)
      SSL stripping attack is a man- in- the- middle attack which poses a serious threat to the security of secure socket layer protocol. In SSL stripping attack the attacker has ability to downgrade security of SSL protected ...
    • Performance evaluation of kerberos cross-realm authentication using SIMNET 

      Sethi, Ankit Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      Today, the network is being implemented in such a manner that consist of geographi- cally diverse clients and distributed as well as centralized servers. To prevent unauthorized access to system resources such as servers, ...
    • Protecting mobile agents against malicious hosts using trusted computing 

      Panchal, Niravkumar K. (Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
      The concept of mobile agents was invented about a decade ago. Since then, plenty of innovative applications of mobile agents have been proposed. But it remains to be the fact that these applications have not been deployed ...
    • Protecting structures on heap from buffer overflow vulnerabilities with TIED-LibsafePlus 

      Jain, Abhay (Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
      In spite of the numerous defenses that have been devised to combat the buffer overflow attack, buffer overflow vulnerability in the C programs still exist as the one widely exploited by the attackers to subsume the privileges ...
    • Secure and efficient key assignment scheme for dynamic access control in a hierarchy 

      Vadnala, Praveen Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2006)
      The users belonging to an organization are often assigned different access permissions depending on their security class. In this situation, the users belonging to a higher security class are allowed access to the information ...
    • Security analysis of two fair exchange protocols 

      Gahlot, Jai (Dhirubhai Ambani Institute of Information and Communication Technology, 2007)
      E-commerce applications enable two parties to exchange digital items electronically. It is critical for such applications that the underlying protocols ensure the fairness requirement: no honest participant should suffer ...
    • Web services policy in grid 

      Desai, Amee Anilbhai (Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
      Service-oriented computing enables service providers to publish their business functionalities in the form of abstract contracts, which can be discovered by service consumers based on open and standard protocols. Enterprise ...